The post Inside North Korea’s New Deepfake Crypto Scam appeared on BitcoinEthereumNews.com. North Korean crypto hackers are refining a familiar scam. They once relied on fake job offers and investment pitches to spread malware — now their methods are becoming more sophisticated. Previously, these attacks depended on victims interacting directly with infected files. But tighter coordination among hacker groups has allowed them to overcome this weakness, using recycled video calls and impersonations of Web3 executives to deceive targets. Sponsored Sponsored North Korea — A Crypto Hacking Pioneer North Korean crypto hackers are already a global menace, but their infiltration tactics have significantly evolved. Whereas these criminals used to only seek employment in Web3 firms, they’ve been using fake job offers to spread malware more recently. Now, this plan is expanding again. According to reports from Kaspersky, a digital security firm, these North Korean crypto hackers are employing new tools. BlueNoroff APT, a sub-branch of Lazarus Group, the most feared DPRK-based criminal organization, has two such active campaigns. Dubbed GhostCall and GhostHire, both share the same management infrastructure. Novel Tactics Explained In GhostCall, these North Korean crypto hackers will target Web3 executives, posing as potential investors. GhostHire, on the other hand, attracts blockchain engineers with tempting job offers. Both tactics have been in use since last month at the latest, but the threat has been increasing. Sponsored Sponsored Whoever the target is, the actual scam is the same: they trick a prospective mark into downloading malware, whether it be a phony “coding challenge” or a clone of Zoom or Microsoft Teams. Either way, the victim only needs to engage with this trapped platform, at which point the North Korean crypto hackers can compromise their systems. Kaspersky noted a series of marginal improvements, like focusing on crypto developers’ preferred operating systems. The scams have a common point of failure: the victim has to actually… The post Inside North Korea’s New Deepfake Crypto Scam appeared on BitcoinEthereumNews.com. North Korean crypto hackers are refining a familiar scam. They once relied on fake job offers and investment pitches to spread malware — now their methods are becoming more sophisticated. Previously, these attacks depended on victims interacting directly with infected files. But tighter coordination among hacker groups has allowed them to overcome this weakness, using recycled video calls and impersonations of Web3 executives to deceive targets. Sponsored Sponsored North Korea — A Crypto Hacking Pioneer North Korean crypto hackers are already a global menace, but their infiltration tactics have significantly evolved. Whereas these criminals used to only seek employment in Web3 firms, they’ve been using fake job offers to spread malware more recently. Now, this plan is expanding again. According to reports from Kaspersky, a digital security firm, these North Korean crypto hackers are employing new tools. BlueNoroff APT, a sub-branch of Lazarus Group, the most feared DPRK-based criminal organization, has two such active campaigns. Dubbed GhostCall and GhostHire, both share the same management infrastructure. Novel Tactics Explained In GhostCall, these North Korean crypto hackers will target Web3 executives, posing as potential investors. GhostHire, on the other hand, attracts blockchain engineers with tempting job offers. Both tactics have been in use since last month at the latest, but the threat has been increasing. Sponsored Sponsored Whoever the target is, the actual scam is the same: they trick a prospective mark into downloading malware, whether it be a phony “coding challenge” or a clone of Zoom or Microsoft Teams. Either way, the victim only needs to engage with this trapped platform, at which point the North Korean crypto hackers can compromise their systems. Kaspersky noted a series of marginal improvements, like focusing on crypto developers’ preferred operating systems. The scams have a common point of failure: the victim has to actually…

Inside North Korea’s New Deepfake Crypto Scam

2025/10/29 07:08

North Korean crypto hackers are refining a familiar scam. They once relied on fake job offers and investment pitches to spread malware — now their methods are becoming more sophisticated.

Previously, these attacks depended on victims interacting directly with infected files. But tighter coordination among hacker groups has allowed them to overcome this weakness, using recycled video calls and impersonations of Web3 executives to deceive targets.

Sponsored

Sponsored

North Korea — A Crypto Hacking Pioneer

North Korean crypto hackers are already a global menace, but their infiltration tactics have significantly evolved.

Whereas these criminals used to only seek employment in Web3 firms, they’ve been using fake job offers to spread malware more recently. Now, this plan is expanding again.

According to reports from Kaspersky, a digital security firm, these North Korean crypto hackers are employing new tools.

BlueNoroff APT, a sub-branch of Lazarus Group, the most feared DPRK-based criminal organization, has two such active campaigns. Dubbed GhostCall and GhostHire, both share the same management infrastructure.

Novel Tactics Explained

In GhostCall, these North Korean crypto hackers will target Web3 executives, posing as potential investors. GhostHire, on the other hand, attracts blockchain engineers with tempting job offers. Both tactics have been in use since last month at the latest, but the threat has been increasing.

Sponsored

Sponsored

Whoever the target is, the actual scam is the same: they trick a prospective mark into downloading malware, whether it be a phony “coding challenge” or a clone of Zoom or Microsoft Teams.

Either way, the victim only needs to engage with this trapped platform, at which point the North Korean crypto hackers can compromise their systems.

Kaspersky noted a series of marginal improvements, like focusing on crypto developers’ preferred operating systems. The scams have a common point of failure: the victim has to actually interact with suspicious software.

This has harmed previous scams’ success rate, but these North Korean hackers have found a new way to recycle lost opportunities.

Turning Failures into New Weapons

Specifically, the enhanced coordination between GhostCall and GhostHire has enabled hackers to improve their social engineering. In addition to AI-generated content, they can also use hacked accounts from genuine entrepreneurs or fragments of real video calls to make their scams believable.

One can only imagine how dangerous this is. A crypto executive might cut off contact with a suspicious recruiter or investor, only to have their likeness later weaponized against new victims.

Using AI, hackers can synthesize new “conversations” that mimic a person’s tone, gestures, and surroundings with alarming realism.

Even when these scams fail, the potential damage remains severe. Anyone approached under unusual or high-pressure circumstances should stay vigilant—never download unfamiliar software or engage with requests that seem out of place.

Source: https://beincrypto.com/north-korea-deepfake-crypto-scam-lazarus/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

EU Gears Up for Final Pressure on Russia with 19th Sanctions Wave

EU Gears Up for Final Pressure on Russia with 19th Sanctions Wave

The post EU Gears Up for Final Pressure on Russia with 19th Sanctions Wave appeared on BitcoinEthereumNews.com. Key Highlights EU moves ban on Russian LNG imports forward to Jan 2027, speeding up energy cut-offs. Sanctions expand to crypto platforms, shadow shipping fleets, and banks in third countries. New penalties for those involved in abduction and indoctrination of Ukrainian children. EU Accelerates Pressure With 19th Sanctions Package Against Russia The European Union has unveiled its 19th sanctions package aimed at crippling Russian war-funding and restricting Moscow’s access to crucial energy, finance, and military technologies. European Commission President Ursula von der Leyen stressed that energy remains Moscow’s lifeline: “Russia’s war economy is sustained by revenues from fossil fuels.” Key Measures and Energy Crackdown The new measures are wide-ranging and cut deeper than previous rounds: Ban on Russian liquefied natural gas (LNG) starting January 1, 2027 New restrictions on Russian banks and financial institutions, including those operating through third countries More than 100 vessels from Russia’s “shadow fleet” blacklisted Tighter control over crypto platforms used to bypass sanctions Von der Leyen emphasized the scope of the crackdown, pointing to Russia’s energy sector and sanctions evasion: “We are now going after those who fuel Russia’s war by purchasing oil in breach of the sanctions.” Additional restrictions also target individuals responsible for the abduction and deportation of Ukrainian children into “re-education camps,” underscoring the EU’s determination to hold human rights violators accountable. Human Rights, Finance, and Elusive Loopholes Under Fire The EU also moved to tighten restrictions on access to sensitive technologies ranging from artificial intelligence and geospatial data to resources used in weapons manufacturing. These steps are designed to close loopholes exploited by Moscow through intermediaries in countries such as China and India. Key highlights of this part of the package include: Limits on high-tech exports with potential military applications Restrictions on special economic zones within Russia Penalties for companies aiding…
Share
BitcoinEthereumNews2025/09/20 00:24