Skip to content
Tutorial emka
Menu
  • Home
  • Debian Linux
  • Ubuntu Linux
  • Red Hat Linux
Menu
zoom stealer malware

The Fake Zoom Meeting Scam: How UNC1069 Uses Deepfakes and AI to Steal Your Cryptocurrency Explained

Posted on February 11, 2026

Imagine you are a successful developer or a venture capitalist working in the fast-paced world of cryptocurrency, and a famous startup founder reaches out to you on Telegram for a quick meeting. It sounds like a great opportunity, but within minutes of joining a simple video call, your digital wallet is empty and your sensitive data is gone. This is the reality of the latest campaigns by a North Korean threat actor known as UNC1069, a group that is becoming increasingly dangerous by blending traditional social engineering with advanced artificial intelligence.

The threat actor UNC1069, which is also tracked by cybersecurity professionals under the names CryptoCore and MASAN, has been active since at least April 2018. While they originally focused on traditional financial institutions, they have recently shifted their focus entirely toward the Web3 industry, including centralized exchanges, venture capital funds, and high-tech software developers. This group is not just looking for a quick win; they are highly patient and use sophisticated tools to build trust with their victims before launching an attack. By using compromised Telegram accounts of legitimate entrepreneurs, they create an illusion of authenticity that is very difficult for even tech-savvy individuals to detect.

The attack sequence typically begins with a direct message on Telegram. The hackers impersonate reputable investors or founders and suggest a 30-minute meeting to discuss a potential partnership or investment. To make the process look professional, they use Calendly links to schedule the call, but these links eventually redirect the victim to a fake website that mimics the official Zoom interface. In some instances, the attackers use the hyperlink feature in Telegram to hide malicious URLs, making a dangerous link look like a standard “zoom.us” address. This initial stage of the attack is crucial because it relies on the victim’s psychological tendency to trust a scheduled business appointment.

Once the victim clicks the link, they are taken to a fake video call interface that looks identical to the real Zoom application. The website asks the user to enable their camera and enter their name to join the session. When the target joins, they are greeted with video footage of what appears to be a live person on the other end. Research from Google Mandiant and Kaspersky suggests that these videos are often deepfakes created using generative AI or actual recordings stolen from previous victims. In a clever move, once a recording finishes playing, the interface smoothly transitions to the person’s profile image, maintaining the illusion that the call is still active but the other person has simply turned off their camera.

The technical complexity increases significantly during the next phase, which utilizes a technique known as ClickFix. The victim is shown a fake error message claiming there is an issue with their computer’s audio or video settings. To “fix” the problem, the site instructs the user to copy and run a specific command in their system terminal or PowerShell. For macOS users, this command triggers an AppleScript that downloads and executes a malicious Mach-O binary called WAVESHAPER. This C++ executable is the first step in a long chain of malware designed to take full control of the host system. Once WAVESHAPER is running, it gathers basic system information and brings in a Go-based downloader known as HYPERCALL.

Following the initial infection, the attackers deploy a variety of secondary payloads to ensure they can steal as much data as possible. One of the primary components is HIDDENCALL, a Golang backdoor that gives the hackers hands-on keyboard access to the infected computer. Working alongside this is DEEPBREATH, a Swift-based data miner specifically built for macOS. DEEPBREATH is particularly dangerous because it attempts to manipulate the Transparency, Consent, and Control (TCC) database on the Mac. By doing this, the malware gains permission to access sensitive files without the user ever seeing a permission prompt. This allows the group to steal iCloud Keychain credentials, browser data from Chrome and Brave, and even private notes from the Apple Notes application.

The group also utilizes another downloader called SUGARLOADER, which is responsible for installing a browser extension named CHROMEPUSH. This extension is a highly effective data stealer written in C++ that masquerades as a legitimate tool for editing Google Docs offline. Once installed in Google Chrome or Brave, it records every keystroke the user types, captures usernames and passwords, and extracts browser cookies that can be used to bypass two-factor authentication. To round out their toolkit, UNC1069 often deploys a minimalist backdoor called SILENCELIFT, which acts as a persistent connection to their command-and-control server, allowing them to monitor the victim for long periods.

The sheer volume of unique malware families deployed on a single computer highlights how determined this North Korean group is to facilitate financial theft. They are no longer just using simple phishing emails; they are leveraging advanced AI tools like Gemini to create convincing lure materials and deepfake technology to bypass the human element of security. This evolution in tactics shows that the cryptocurrency sector remains a high-priority target for state-sponsored actors who are looking for ways to bypass international sanctions and fund their operations. The combination of social engineering, deceptive AI, and a multi-layered malware chain makes UNC1069 one of the most sophisticated threats facing the Web3 community today.

Understanding these threats is the first step in staying safe in a digital world where seeing is no longer believing. It is vital to remember that legitimate software companies like Zoom will never ask you to run manual terminal commands or AppleScripts to fix a common audio issue. You should always verify the identity of the person you are meeting with through a secondary communication channel before clicking any links. If you are ever prompted to download a “troubleshooting” tool or run a command from a website, you should immediately close the tab and report the incident to your security team. Staying skeptical of unsolicited messages and maintaining strict control over your system permissions is the best way to protect your digital assets from these advanced persistent threats.

Ref:

  • Google Cloud: https://cloud.google.com/blog/topics/threat-intelligence/unc1069-targets-cryptocurrency-ai-social-engineering
  • TheHackerNews: https://thehackernews.com/2026/02/north-korea-linked-unc1069-uses-ai.html

Recent Posts

  •  How to Fix Windows 11 ISO Download Blocked and Error Messages
  • How to Make Your Website Vibrate with Web Haptics
  • Measuring LLM Bullshit Benchmark
  • A Step-by-Step Guide to ZITADEL Identity Infrastructure
  • How NVIDIA G-SYNC Pulsar is Finally Fixing Motion Blur Forever
  • How Multipathing Keeps Your Linux Systems Running Smoothly!
  • Forgejo: A Self-hosted Github Alternative You Should Try
  • Introducing Zo Computer, How it Will Changing Personal Data Science Forever
  • Which AI Brain Should Your Coding Agent Use? A Deep Dive into the OpenHands Index
  • Hoppscotch, The Postman Killer: Why You Should Switch from Postman to Hoppscotch Right Now
  • Nitrux 6.0 Released with Linux Kernel 6.19: What’s New?
  • How to Upgrade Pop!_OS 22.04 LTS to 24.04 LTS: A Step-by-Step Guide
  • KDE Plasma 6.6.2 Released: Key Bug Fixes and Enhancements Explained
  • Meet the Huawei NetEngine 8000: The Router Powering the Next Generation of AI-Driven Networks!
  • LLM Settings That Every AI Developer Must Know
  • Is Your Second Monitor a Mess? Kubuntu 26.04 Resolute Raccoon Finally Fixes Multi-Display Woes!
  • How to Run Massive AI Models on Your Mac: Unlocking Your Hidden VRAM Secrets
  • How to Create Gemini CLI Agent Skills
  • WTF? Ubuntu Planning Mandatory Age Verification
  • Why This Retro PC is Actually a Modern Beast: Maingear Retro98
  •  Windows 11 Taskbar Update: How to Move and Resize Your Taskbar Again
  • Does KDE Plasma Require Systemd? Debunking the Mandatory Dependency Myths
  •  How to Fix ‘docs.google.com Refused to Connect’ Error in Windows 10/11
  • Aerynos Feb 2026 Update: Faster Desktops and Moss Performance Boost
  • Pangolin 1.16 Adds SSH Auth Daemon: What You Need to Know
  • Inilah 10 Jurusan Terfavorit di Universitas Negeri Semarang Buat SNBT 2026, Saingannya Ketat Banget!
  • Belum Tahu? Inilah Cara Mudah Membuat Akun dan Login EMIS GTK IMP 2026 yang Benar!
  • Cara Dapat Kode Kartu Hadiah Netflix Gratis Tanpa Ribet
  • Inilah Caranya Dapet Bukti Setor Zakat Resmi dari NU-Care LazisNU Buat Potong Pajak di Coretax!
  • Inilah 10 Jurusan Terfavorit di Universitas Brawijaya Buat SNBT 2026, Saingannya Ketat Banget!
  • Nano Banana 2: How to Bypassing Google’s Invisible SynthID Watermark
  • Qwen 3.5 Small Explained!
  • A Step-by-Step Guide to Integrating Claude Code with Jira and Confluence
  • How AI Agents Collaborate Using Global Standards
  • Why Your AI is Slow: Breaking Through the Memory Wall with Diffusion LLMs
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025
©2026 Tutorial emka | Design: Newspaperly WordPress Theme