Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. North Korean Hackers Use Fake Zoom Meeting to Target Crypto
North Korean Hackers Use Fake Zoom Meeting to Target Crypto
NEWS

North Korean Hackers Use Fake Zoom Meeting to Target Crypto

UNC1069, a North Korean APT group, deployed a sophisticated ClickFix scam using a fake Zoom meeting to target a cryptocurrency executive in a social...

Dylan H.

News Desk

February 8, 2026
5 min read

North Korean APT Targets Crypto Industry

North Korean hackers, identified as UNC1069, have targeted a cryptocurrency executive using a sophisticated fake Zoom meeting combined with a ClickFix scam, marking the latest evolution in DPRK-linked cryptocurrency theft operations.


Attack Overview

AttributeDetails
Threat ActorUNC1069 (North Korea-linked APT)
TargetCryptocurrency executive
Attack VectorFake Zoom meeting invitation + ClickFix scam
ObjectiveCryptocurrency theft, persistent access
SophisticationHigh (multi-stage social engineering)

How the Attack Worked

Stage 1: Initial Contact

The attacker posed as a legitimate business contact and scheduled a Zoom meeting with the target. The meeting invitation appeared authentic, leveraging:

  • Spoofed email addresses mimicking real companies
  • Professional meeting descriptions with business-relevant topics
  • Realistic calendar invites with proper formatting

Stage 2: The Fake Zoom Link

When the victim attempted to join the meeting, they were directed to a malicious webpage that closely mimicked Zoom's legitimate interface. The page claimed:

"Your Zoom client is out of date. Click here to download the latest version."

Stage 3: ClickFix Scam Deployment

The ClickFix scam is a social engineering technique where victims are tricked into:

  1. Copying a malicious command presented as a "fix"
  2. Pasting it into their terminal or PowerShell
  3. Executing code that installs malware

In this attack, the victim was presented with instructions to:

  • Open PowerShell (Windows) or Terminal (macOS)
  • Paste a "connection fix" command
  • Run the command to "resolve Zoom connectivity issues"

The command was actually a base64-encoded payload that downloaded and executed malware.


The Malware Payload

Once executed, the malware provided the attackers with:

Capabilities

  • Credential harvesting — Steal cryptocurrency wallet credentials
  • Keylogging — Capture passwords and seed phrases
  • Screen recording — Monitor cryptocurrency transactions
  • Clipboard hijacking — Replace crypto wallet addresses with attacker-controlled addresses
  • Persistence — Remain active across reboots

Objectives

The primary goal was cryptocurrency theft, but the malware also enabled:

  • Long-term espionage on crypto holdings
  • Future social engineering campaigns using harvested contacts
  • Supply chain attacks if the victim had access to broader crypto infrastructure

Why Cryptocurrency Executives?

North Korean APT groups have a well-documented history of targeting the cryptocurrency industry:

DPRK Crypto Theft Operations

YearNotable AttacksEstimated Value
202447 crypto heists$1.34 billion
2025Escalating attacks$2+ billion (estimated)
2026Ongoing operationsTBD

Why Crypto?

  1. Sanctions evasion — Cryptocurrency provides a means to bypass international sanctions
  2. Regime funding — Stolen crypto funds North Korea's weapons programs
  3. Difficult attribution — Blockchain transactions can be obfuscated through mixers and exchanges
  4. High-value targets — Cryptocurrency executives control significant digital assets

The ClickFix Scam Trend

ClickFix scams represent a dangerous evolution in social engineering attacks:

How ClickFix Works

Traditional phishing relies on malicious attachments or links. ClickFix scams trick victims into manually executing code, which:

  • Bypasses traditional email security (no malicious attachment or link)
  • Evades endpoint protection (victim executes code directly)
  • Increases success rate (victims trust "tech support" instructions)

Recent ClickFix Campaigns

  • Fake Microsoft Teams errors — "Fix" commands install malware
  • Google Meet "connectivity issues" — PowerShell commands deploy RATs
  • Zoom "update required" — Terminal commands download crypto stealers

What Cryptocurrency Professionals Should Do

Immediate Actions

  1. Verify meeting links — Always join Zoom meetings through the official Zoom app, not web links
  2. Never paste commands from web pages, emails, or chat messages into your terminal
  3. Use hardware wallets — Keep crypto assets in cold storage, not hot wallets on your workstation
  4. Enable MFA everywhere — Use hardware security keys (YubiKey, Titan Key) for crypto accounts

Long-Term Security

  1. Conduct social engineering training — Educate teams on fake meeting scams
  2. Implement network segmentation — Isolate crypto operations from general business networks
  3. Monitor for unusual activity — Watch for unexpected outbound connections, clipboard monitoring, or screen recording processes
  4. Use dedicated devices — Consider a separate, air-gapped device for crypto wallet management

Indicators of Compromise (IOCs)

While specific IOCs for this attack have not been publicly released, organizations should watch for:

Behavioral Indicators

  • PowerShell or Terminal commands pasted from web pages
  • Unexpected Zoom "update" prompts when joining meetings
  • Suspicious calendar invites from unknown senders
  • Unusual outbound connections to North Korean IP ranges

Technical Indicators

  • Base64-encoded PowerShell commands
  • Unsigned Zoom "update" executables
  • Clipboard monitoring processes
  • Keylogger services running in background

The Broader Campaign

This attack is part of a sustained North Korean campaign targeting the cryptocurrency industry. Recent UNC1069 activity includes:

  • Supply chain attacks on crypto wallet software
  • Fake job offer campaigns targeting crypto employees
  • Watering hole attacks on cryptocurrency news sites
  • Romance scams targeting crypto investors

Security researchers expect North Korean APT activity to intensify in 2026 as sanctions pressure increases and cryptocurrency values rise.


Sources

  • The Hacker News — North Korean Hackers Target Crypto Executive
  • Cyware — Cyber Security News Articles

Related Reading

  • North Korea Deploys AI-Generated Video and ClickFix
  • Lazarus Group Plants 192 Malicious Packages in npm and PyPI
  • North Korea
#North Korea#APT#Cryptocurrency#Social Engineering#Zoom#UNC1069#ClickFix

Related Articles

North Korea Deploys AI-Generated Video and ClickFix

North Korean threat actors are running sophisticated campaigns using AI-generated deepfake videos and the ClickFix social engineering technique to target...

6 min read

Lazarus Group Plants 192 Malicious Packages in npm and PyPI

North Korea's Lazarus Group is running a fake recruitment campaign codenamed Graphalgo, planting 192 malicious packages on npm and PyPI that target...

3 min read

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

A newly observed ClickFix campaign impersonates Cloudflare's CAPTCHA verification pages to deliver the Python-based Infiniti Stealer to macOS users via a multi-stage chain involving a Bash script and a Nuitka-compiled loader.

4 min read
Back to all News