North Korean Cybercriminals Exploit Fake Zoom Tactics to Steal $300M in Crypto
North Korean threat actors are escalating attacks using fake Zoom invitations delivered via Telegram, compromising victims' private keys and draining wallets. Security Alliance (SEAL) reports daily incidents, with losses exceeding $300 million. The scheme leverages social engineering: attackers impersonate trusted contacts, initiate video calls through Calendly links, and deploy malware during sessions.
MetaMask researcher Taylor Monahan warns the operation targets crypto holders globally, emphasizing the sophistication of DPRK's cybercrime apparatus. The attack vector exploits familiarity—using prior conversation history to bypass suspicion—before redirecting to malicious Zoom meetings.