North Korean hackers have stolen over $300 million by faking Zoom meetings to spread malware.

AI Summary1 min read

TL;DR

North Korean hackers have stolen over $300 million by using fake Zoom meetings to spread malware, tricking victims into downloading malicious patches. The scheme involves directing traffic from Telegram, disguising links, and exploiting audio issues to implant malware for stealing passwords and keys.

Tags

North Korean hackersZoom malwarecybersecurity threatcryptocurrency theftphishing attack

PANews reported on December 15th that, according to Cointelegraph, cybersecurity firm Security Alliance (SEAL) stated that North Korean hackers are using fake Zoom meetings to trick victims into downloading patch files that implant malware, stealing passwords and private keys. Taylor Monahan warned that this method has already caused over $300 million in losses. The modus operandi includes: directing traffic from familiar Telegram accounts → disguising meeting links and recorded videos → sending patches during the meeting under the pretext of audio malfunctions → continuing intrusion after ending the call. If you have already clicked the link, it is recommended to immediately disconnect from the internet and shut down your device, transfer your encrypted assets to a new wallet using another device, change all passwords and enable two-factor authentication, and perform a full cleanup of the infected device; simultaneously, terminate other Telegram conversations, change your password and enable multi-factor authentication, and inform your contacts as soon as possible to prevent further spread.

Visit Website