‘The attacker completed in under five minutes’: Experts warn of North Korea-linked campaign using fake Zoom meetings to target crypto executives


  • State-sponsored attackers made convincing fake video calls to target cryptocurrency companies
  • A clipboard hijacking trick replaced benign commands with code that deploys malware
  • The operation quickly enabled credential theft, persistence, and complete system compromise

Security researchers Arctic Wolf have revealed details of a highly sophisticated campaign targeting North American Web3 and cryptocurrency companies.

It is carried out by state-sponsored threat actors called BlueNoroff, a financially motivated subset of the dreaded North Korean Lazarus Group, with the goal of establishing persistent access on their target’s devices.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top