Crypto Alert: UNC1069 Deploys AI Deepfakes and New Mac Malware in Bold Crypto Attacks
Introduction: A New Wave of Crypto Threats
Cryptocurrency and DeFi sectors are under fire. North Korean-linked hackers known as
In a recent case,
How the Attack Started: Social Engineering with AI
The hack began on Telegram. Hackers took over an executive’s account from a crypto company. They messaged the victim, built trust, then sent a Calendly link for a meeting. It led to a fake Zoom page on hacker servers: zoom[.]uswe05[.]us.
During the “call,” a deepfake video of a CEO appeared. The victim thought it was real. Hackers claimed audio issues and pushed a ClickFix trick. They gave commands to “fix” the problem. Hidden in those was malware code.
- Mac commands: Used AppleScript to start infection.
- Windows commands: Ready for other systems.
This is not new for
The Infection Chain: From Click to Full Control
Victim ran the commands on a Mac. AppleScript dropped first. Then came WAVESHAPER, a packed backdoor. It fetched more tools like HYPERCALL downloader.
HYPERCALL, in Go language, grabbed dynamic libraries from C2 servers. It used RC4 encryption and reflective loading to hide. It deployed:
- HIDDENCALL: For remote keyboard access.
- SUGARLOADER: Known downloader with persistence.
- SILENCELIFT: Beacons system info.
Even without EDR tools, Mac’s XProtect logged violations. Timestamps showed the full chain.
Key Malware Tools: Data Thieves Exposed
DEEPBREATH: Bypasses Mac Privacy
Swift-based data miner. It tweaks the TCC database for full file access. Uses Finder’s permissions to rename and edit TCC.db. Steals:
- Keychain credentials.
- Chrome, Brave, Edge data.
- Telegram and Apple Notes.
Data zipped and sent via curl.
CHROMEPUSH: Browser Extension Spy
C++ data miner. Installs fake Google Docs extension in Chrome and Brave. Acts as native messaging host. Logs keys, grabs cookies, takes screenshots. Sends to cmailer[.]pro.
Persists via launch daemon in /Library/LaunchDaemons.
SUGARLOADER and Others
Old favorite from
WAVESHAPER: C++ backdoor, forks daemon, grabs system info.
HYPERCALL & HIDDENCALL: Linked by code shares, AOT files prove ties.
SILENCELIFT: Simple beacon, messes with Telegram if root.
: Evolving North Korean Threat
Active since 2018,
They use AI across ops: lures, tooling, recon. Overlaps with Bluenoroff using GPT-4o for images.
This attack hit one device hard. Goal: Steal crypto now, use data for more phishing later.
Why Crypto is Prime Target
High rewards. Crypto firms hold big funds. Individuals have wallets. Hackers pivot from personal to corporate devices. New tools show pro skills but some sloppy code hints at varied devs.
How to Protect Your Crypto Setup
- Verify Contacts: Check Telegram owners. Warn if hijacked.
- Spot Fake Meetings: Hover links, check domains.
- Avoid ClickFix: Never run unknown commands.
- Enable Security: Use EDR, XProtect updates. Watch TCC changes.
- AI Awareness: Question videos in calls.
- Browser Safety: Block shady extensions. Use hardware wallets.
- Monitor Logs: Check XPdb for behaviors.
Tools like Google SecOps catch these: TCC tweaks, Chrome mods, keychain hits.
Conclusion: Stay Vigilant in Crypto Wars
The blockchain world grows fast. So do threats. Protect your assets today.
Discuss this news on our Telegram Community. Subscribe to us on Google news and do follow us on Twitter @Blockmanity
Did you like the news you just read? Please leave a feedback to help us serve you better
Disclaimer: Blockmanity is a news portal and does not provide any financial advice. Blockmanity's role is to inform the cryptocurrency and blockchain community about what's going on in this space. Please do your own due diligence before making any investment. Blockmanity won't be responsible for any loss of funds.















