• Home
  • Hack
  • North Korean Hackers Steal $300M with Fake Crypto Meetings
North Korean Hackers Steal $300M with Fake Crypto Meetings
By Hamza Ahmed profile image Hamza Ahmed
2 min read

North Korean Hackers Steal $300M with Fake Crypto Meetings

Cyber criminals linked to North Korea embezzled over $300 million from the crypto sector using fake video meetings, compromised Telegram accounts and advanced malware.

North Korean cyber criminals have implemented a sophisticated change of strategy in their social engineering campaigns, managing to steal over $300 million by impersonating trusted industry figures in fake video encounters.

This alert, detailed by MetaMask security researcher Taylor Monahan (known as Tayvano), outlines a complex 'long con' (long-con) scam targeting crypto executives.

The Bait: Hijacked Telegram Accounts and Fake Contacts

According to Monahan, the campaign marks a departure from recent attacks that relied on deepfakes with artificial intelligence. Instead, it uses a more direct approach, based on hijacking Telegram accounts and using loop footage recycled from real interviews.

The DPRK threat actors are still ripping off too many of you through their fake meetings on Zoom/Teams," he said Monahan on X

The attack typically begins after hackers gain control of a trusted Telegram account, often belonging to a venture capitalist or a person the victim previously met at a conference. Attackers then exploit previous chat history to appear legitimate, leading the victim to a video call on Zoom or Microsoft Teams via a disguised Calendar link.

The Staging: Recycled Videos and Fake Technical Problems

Once the meeting has started, the victim views what appears to be a feed live video of their contact. In reality, it is often a recycled recording from a podcast or public appearance.

The decisive moment usually comes following a simulated technical problem. After citing audio or video problems, the attacker urges the victim to re-establish the connection by downloading a specific script or updating a Software Development Kit (SDK). The file delivered at that point contains the malicious payload.

The Final Blow and the Role of RAT

Once installed, the malware -often a Remote Access Trojan (RAT)-gives the attacker total control over the system. The RAT drains cryptocurrency wallets and exfiltrates sensitive data, including internal security protocols and Telegram session tokens, which are then used to target the next victim in the network.

Bitget -Spacexchange

Monahan warned that this specific carrier "weaponises professional courtesy". The hackers rely on the psychological pressure of a 'business meeting' to force an error in judgement, turning a troubleshooting request for routines into a fatal security breach. For industry participants, any request to download software during a call is now considered an active attack signal.

This strategy of 'fake meetings' is part of a broader offensive by DPRK actors, who have embezzled an estimated $2 billion from the industry over the past year, including the Bybit breach.

By Hamza Ahmed profile image Hamza Ahmed
Updated on
Hack Crypto
Consent Preferences

Crypto Nations: The Battle for Money, Power, and Code

A powerful documentary on how Bitcoin and blockchain are reshaping money, power, and geopolitics—from El Salvador’s Bitcoin experiment and Europe’s regulatory revolution to the rise of decentralized finance and the new global financial order.