The Crypto Blunt
  • All News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market
  • Blockchain
  • AI
  • More
    • About Us
    • Contact
Reading: How North Korean Hackers Use Silent Video Calls to Drain Crypto Wallets
Share
The Crypto BluntThe Crypto Blunt
Font ResizerAa
  • All News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market
  • Blockchain
  • AI
  • More
Search
  • Pages
    • Contact Us
    • Search Page
    • 404 Page
  • Pages
    • Home
    • Contact Us
    • Search Page
    • 404 Page
  • Pages
    • Home
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
  • Personalized
  • Personalized
  • Categories
    • Technology
  • Categories
    • Technology
  • Categories
    • Technology
Have an existing account? Sign In
Follow US
  • Pages
  • Pages
  • Pages
  • Personalized
  • Personalized
  • Personalized
  • Categories
  • Categories
  • Categories

Home - News - How North Korean Hackers Use Silent Video Calls to Drain Crypto Wallets

News

How North Korean Hackers Use Silent Video Calls to Drain Crypto Wallets

Hardik Z.
Last updated: January 31, 2026 10:27 am
Hardik Z. - Chief in Editor & Writer
Published: January 27, 2026
Share
North Korea Linked Hackers Deploy Deepfake Video Calls Against Crypto Firms

AI-generated video calls are being used by hackers to impersonate trusted contacts and deceive crypto workers into installing malware.

Contents
  • Related Attacks
  • North Korea–Linked Group Identified as Primary Suspect

Incessant use of live video calls, including AI-generated deepfakes, is noted by security researchers to be a primary tactic of North Korea-linked hackers. These digital deceptions are employed to trick crypto developers and workers into installing malicious software on their own devices.

In the latest instance disclosed by BTC Prague co-founder Martin Kuchar, a compromised Telegram account and a staged video call were used by attackers to push malware. This malicious code, he said, was disguised as a Zoom audio fix.

A “high-level hacking campaign” appears to be targeting Bitcoin and crypto users, as was disclosed by Martin Kuchar, co-founder of BTC Prague, on Thursday via X.

Victims are contacted by attackers to arrange a Zoom or Teams call, as explained by Martin Kuchar. During the meeting, an AI-generated video is used to appear as a familiar acquaintance of the victim.

An audio problem is then claimed by the attackers, followed by a request for the victim to install a specific plugin or file as a solution. Once this installation is complete, full system access is granted to the hackers, which enables the theft of Bitcoin, the hijacking of Telegram accounts, and the subsequent use of those profiles to target new victims.

A record $17 billion in crypto-related losses was reached in 2025 as AI-driven impersonation scams intensified, according to data from Chainalysis. It was reported by the blockchain analytics firm that deepfake video, voice cloning, and synthetic identities are being increasingly used by attackers to deceive victims and obtain unauthorized access to funds.

Related Attacks

The attack sequence detailed by Martin Kuchar closely aligns with a methodology first identified by the cybersecurity firm Huntress. In a report from July 2025, the firm revealed that targeted crypto workers are lured into staged Zoom calls following initial contact on Telegram, often through the use of a fraudulent meeting link hosted on a spoofed Zoom domain.

During the conference call, an audio problem is typically claimed by the attackers, who then instruct the victim to install what appears to be a legitimate Zoom-related fix. This file, however, is identified by Huntress as a malicious AppleScript that initiates a sophisticated, multi-stage macOS infection designed to exfiltrate sensitive data and establish a persistent backdoor.

Once the script is executed, shell history is disabled, and Rosetta 2 is either checked for or installed on Apple Silicon devices. Additionally, as reported by Huntress, the user is repeatedly prompted for their system password to ensure the attackers gain elevated privileges.

The installation of multiple payloads—including persistent backdoors, keylogging and clipboard tools, and crypto wallet stealers—was found by the study to be the result of this malware chain. A similar sequence was pointed to by Martin Kuchar on Monday when it was disclosed that his Telegram account had been compromised and subsequently used to target others in an identical fashion.

North Korea–Linked Group Identified as Primary Suspect

The intrusion has been attributed with high confidence by security researchers at Huntress to TA444, a North Korea-linked advanced persistent threat. Also recognized as BlueNoroff and operating under the Lazarus Group umbrella, this state-sponsored collective has been identified as a primary driver of cryptocurrency theft since at least 2017.

When questioned about the campaign’s strategic objectives and potential links between incidents, Shān Zhang, Chief Information Security Officer at Slowmist, told that the recent attack on Martin Kuchar is “possibly” connected to wider operations by the Lazarus Group.

“No single indicator is decisive on its own; it’s the combination that matters,” Zhang stated. Deepfake-enabled lures are noted to typically rely on new or disposable meeting accounts and look-alike Zoom or Teams links, while the call itself is described as becoming highly scripted quite quickly. Attackers are said to “create urgency and push the target” to install the so-called “Zoom/Teams fix” early in the conversation.

“There is clear reuse across campaigns. We consistently see targeting of specific wallets and the use of very similar install scripts,” 

David Liberman, co-creator of decentralized AI compute network Gonka .

Visual media and recordings “can no longer be treated as reliable proof of authenticity,” according to Liberman. It was further asserted by him that digital content “should be cryptographically signed by its creator, and such signatures should require multi-factor authorization.”

Narratives, in contexts such as this, have become “an important signal to track and detect,” given how these attacks “rely on familiar social patterns,” he said.

Campaigns against crypto firms, workers, and developers are frequently tied to North Korea’s Lazarus Group. Digital assets and access credentials are stolen by the group through the use of tailored malware and highly sophisticated social engineering.

TAGGED:CryptoHackedLatest News on Artificial Intelligence (AI)North Korea

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
ByHardik Z.
Chief in Editor & Writer
Follow:
Hardik Z. is a cryptocurrency expert, trader and well-researched journalist with extensive experience of covering everything related to the burgeoning industry — from price analysis to Blockchain disruption. Hardik authored more than 1,000+ stories for Thecryptoblunt.com, and other fintech media outlets. He’s particularly interested in web3, crypto trends, regulatory trends around the globe that are shaping the future of digital assets, can be contacted at hardik.z@thecryptoblunt.com
Previous Article Fundstrat’s Tom Lee Predicts Crypto Rebound as Gold and Silver Lose Steam Fundstrat’s Tom Lee Predicts Crypto Rebound as Gold and Silver Lose Steam
Next Article 'Risk-on Confirmed' – Here's What Will Send Bitcoin on a New Rally, According to Analyst Bitcoin Rally Hinges on Confirmed Risk-On Environment, Analyst Says
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FacebookLike
XFollow
InstagramFollow
LinkedInFollow
MediumFollow
RSS FeedFollow
The Crypto BluntLogo
Subscribe to our newsletter to get our newest articles instantly!
Most Read
Silver Rally Mirrors Crypto Altcoin Cycles, Says Bitwise Executive

Silver Rally Mirrors Crypto Altcoin Cycles, Says Bitwise Executive

What is Bonk?

What is Bonk (BONK)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is BNB?

What is BNB? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Bittensor? 

What is Bittensor (TAO)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Bitget Token?

What is Bitget Token (BGB)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Bitcoin Cash? 

What is Bitcoin Cash (BCH)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Avalanche(AVAX)?

What is Avalanche(AVAX)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Arbitrum? 

What is Arbitrum(ARB)? What It Is, Overview, Works, Guides, Everything You Need to Know

Aptos

What is Aptos(APT)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Aave (AAVE)? What It Is, Overview, Works, Guides, Everything You Need to Know

What is Aave (AAVE)? What It Is, Overview, Works, Guides, Everything You Need to Know

thecryptoblunt-telegram
Logo

The most recent real-time news about crypto at Thecryptoblunt. Latest trusted news about bitcoin, ethereum, blockchain, mining, cryptocurrency prices and more.

NEWS
  • Explained
  • News
  • AI
  • Blockchain
COMPANY
  • About Us
  • Career
GET IN TOUCH
  • Contact
  • Terms & conditions
  • Privacy Policy
  • Consent Settings
  • Disclaimer
  • Cookie Policy
  • Editorial policy
  • RSS

© The Crypto Blunt 2025. All Rights Reserved.

© The Crypto Blunt. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?