North Korean Hackers Siphon $300M from Crypto Wallets via Zoom Scam

Generated by AI AgentJax MercerReviewed byAInvest News Editorial Team
Monday, Dec 15, 2025 3:31 am ET3min read
Aime RobotAime Summary

- North Korean hackers use fake

links to steal crypto wallet keys via malware, draining over $300M from victims.

- Scam exploits social engineering by impersonating contacts on Telegram, tricking users into downloading malicious "patch files."

- Security experts urge immediate action: disconnect devices, transfer assets to hardware wallets, and enable 2FA to prevent further losses.

- Attack highlights growing sophistication of state-backed cybercrime, leveraging trusted platforms like Zoom for large-scale crypto theft.

North Korean Hackers Target Crypto Investors via Fake Calls

North Korean hackers have launched a sophisticated cryptocurrency scam targeting investors using fake Zoom meeting invitations. The scam involves malware that steals private keys and login credentials, allowing hackers to access victims' crypto wallets without their knowledge. Security experts warn that the attack is highly effective, with victims often unaware their accounts have been compromised until funds are gone

.

The scam typically begins with a seemingly legitimate Zoom link sent via Telegram from an account posing as a friend or colleague. Once the victim clicks the link and joins the call, the attacker fabricates technical issues and sends a "patch file" that injects malware into the device. This malware then captures sensitive information, including private keys, allowing attackers to drain crypto wallets

.

Initial reports indicate that the scam has already siphoned over $300 million in cryptocurrency from investors, underscoring the growing threat of North Korean cybercriminal activity in the digital asset space. Security researchers emphasize the urgency for users to take immediate action to protect their digital assets and avoid falling victim to similar schemes

.

How the Scam Operates

Hackers have perfected the art of social engineering, using trust-based tactics to lure victims into their traps. The scam relies on the common practice of sharing Zoom links for meetings, which makes the fraudulent invitations appear credible. Once the victim engages with the call, the malware is triggered, often without their knowledge. This malware can remain dormant for a period, allowing attackers to avoid immediate detection

.

The stolen data includes not only passwords but also private keys used to access cryptocurrency wallets. These keys are critical for controlling crypto assets and are nearly impossible to recover once compromised. In many cases, victims only realize their wallets have been drained when they attempt to make a transaction and find their funds missing

.

Steps to Protect Your Crypto

Security experts and organizations like the Security Alliance have issued clear guidelines for users who may have clicked on a suspicious link. Immediate action is critical to mitigate further damage. Users are advised to disconnect from the internet, transfer their assets to a new secure wallet, and change all related passwords

. Enabling two-factor authentication (2FA) adds an extra layer of security, making it more difficult for attackers to access accounts even if they have a password .

Beyond these immediate actions, users should also consider wiping their device's memory completely to remove any potential malware. This step is essential to ensure that no residual threats remain on the system. Additionally, users should move crypto assets to hardware-backed storage solutions, which are more secure than software wallets

.

Why This Threat Is Serious

As the adoption of cryptocurrency continues to grow, so does the sophistication of cyber threats targeting digital assets. North Korean hacking groups have a well-documented history of carrying out high-profile cyberattacks, often involving both technical malware and psychological manipulation. These groups are known for combining advanced technical capabilities with well-crafted social engineering tactics to achieve their goals

.

The use of video conferencing platforms like Zoom is particularly concerning because these platforms are widely trusted in both professional and personal settings. Hackers exploit this trust to create a sense of legitimacy around their fraudulent activities. Analysts warn that as crypto adoption accelerates, the frequency and complexity of such attacks are likely to increase

.

How to Stay Safe From Future Crypto Attacks

Users are urged to remain vigilant and adopt best security practices to minimize their risk. This includes avoiding clicking on links from unknown or unverified sources, even if they appear to come from trusted contacts. Regularly updating software and using strong, unique passwords for each account are also essential steps

.

Additionally, monitoring crypto wallets for any unusual activity can help detect potential breaches early. Users should also consider using hardware wallets for long-term storage of their assets, as these are less vulnerable to online threats. Security researcher Taylor Monahan emphasizes that education and awareness are key components of digital asset security, especially as cybercriminal tactics evolve

.

Protecting Against Future Crypto Attacks

This latest scam highlights the need for a proactive approach to security in the crypto space. As digital assets become more integrated into mainstream finance, the risks of cybercrime will only increase. Users must take responsibility for their own security by staying informed and implementing robust protective measures. In the face of growing threats, awareness and caution remain the first line of defense against cybercriminals

.

Comments



Add a public comment...
No comments

No comments yet