nation stateanalysis

North Korean hackers use deepfake video calls to target crypto firms

March 21, 20269 min read7 sources
Share:
North Korean hackers use deepfake video calls to target crypto firms

Background and context

North Korean cyber operators have spent years refining a profitable formula: identify people with access to digital assets, approach them through trusted channels, and use social engineering to turn a single employee into an entry point for theft or broader compromise. New reporting indicates that playbook is evolving again. According to Infosecurity Magazine, attackers linked to North Korea are using stolen Telegram accounts, fake Zoom meetings, deepfake-style video impersonation and ClickFix lures to deliver infostealer malware against cryptocurrency firms (Infosecurity Magazine).

The campaign is notable less for a novel software exploit than for how effectively it combines several proven techniques. A compromised Telegram account gives the attacker a believable identity. A video call adds perceived legitimacy. A ClickFix prompt creates urgency and pushes the victim to run commands themselves. The end goal appears to be infostealer deployment, which can harvest passwords, browser cookies, wallet-related data and authentication tokens that may open the door to exchange accounts, cloud services and internal systems.

This fits a broader pattern documented by government agencies and threat intelligence firms. The FBI, CISA and the U.S. Treasury have repeatedly warned that North Korean operators target crypto businesses to generate revenue and collect access, often through social engineering rather than direct exploitation of software flaws (CISA/FBI advisory AA22-108A, U.S. Treasury). Google-owned Mandiant has also described DPRK-linked campaigns that impersonate recruiters and use fake job workflows to compromise developers and crypto personnel (Google Cloud/Mandiant).

How the attack works

Based on the reporting and the wider body of research on DPRK tradecraft, the attack chain is straightforward but effective.

Step 1: Initial contact through a trusted channel. Attackers reportedly use stolen Telegram accounts to message targets. That matters because Telegram is widely used in crypto, venture and Web3 circles for investor outreach, hiring, deal discussions and operational coordination. A message from a known contact or a familiar account lowers suspicion immediately.

Step 2: Move the target into a live meeting. The victim is invited to a Zoom call or similar meeting. The attackers may use deepfake elements, synthetic video, pre-recorded footage or other identity assets to appear as a recruiter, partner, executive or colleague. The purpose is not necessarily to create a perfect fake. It is to remove enough doubt that the target continues following instructions.

Step 3: Introduce a technical problem. This is where ClickFix comes in. ClickFix is a social-engineering technique in which the victim is told there is an issue with audio, video, browser access, meeting software or security verification and is then instructed to copy and paste a command into PowerShell, Terminal, the Windows Run dialog or a browser console. Security researchers have seen this pattern used by many threat actors because it bypasses some traditional phishing controls by making the victim execute the malicious step manually (Proofpoint).

Step 4: Deliver the payload. The pasted command typically downloads or launches malware. In this case, the reporting points to infostealer malware. That class of malware is built to collect browser credentials, session cookies, stored tokens, system details, chat credentials and sometimes crypto wallet extension data.

Step 5: Use stolen access for theft or follow-on intrusion. Once the malware has done its job, the attackers can attempt account takeover, cloud access, internal chat compromise or direct theft from crypto platforms and wallets. Because session tokens and cookies are often captured, multi-factor authentication may not fully protect the victim if the attacker can replay authenticated sessions.

Technical details that matter

No public reporting tied this campaign to a specific CVE, and that is an important point. This appears to be a human-centered intrusion chain, not a vulnerability exploitation campaign. The weak point is trust: trust in a familiar messaging account, trust in a face on a video call, and trust in a plausible troubleshooting step.

That said, the technical risk is still serious. Infostealers commonly target:

browser-stored usernames and passwords; session cookies that can enable account hijacking; autofill data; crypto wallet extensions; Telegram or Discord credentials; SSH keys; cloud and single sign-on tokens; and local files that may contain seed phrases, API keys or internal documentation. CISA has warned that infostealers are a major source of credential compromise and often serve as the first stage for more damaging attacks (CISA AA23-195A).

For crypto firms, session theft is especially dangerous. Password resets and MFA prompts may help after the fact, but if an attacker captures an already authenticated browser session, they may be able to access dashboards, admin panels or exchange interfaces without needing the user’s second factor. That is why device-bound sessions, short session lifetimes and conditional access controls are increasingly important.

The deepfake angle also deserves careful framing. Public discussion often treats deepfakes as if they must be flawless to work. In practice, attackers only need enough realism to keep the victim engaged for a few minutes. A slightly awkward video feed can be explained away as poor bandwidth, camera issues or conferencing glitches. In remote-first industries, people are already accustomed to low-quality calls. That lowers the bar for deception.

When discussing identity protection and secure remote access, firms should also review their use of VPN service tools, endpoint monitoring and hardened admin workflows, though a VPN alone will not stop this type of social engineering.

Why crypto firms are attractive targets

North Korea’s interest in cryptocurrency is well documented. The U.N., blockchain analytics companies and multiple governments have linked DPRK operators to thefts that generate revenue for the regime. Chainalysis estimated that North Korea-linked actors stole roughly $1 billion in crypto in 2023 and attributed even larger totals in prior years, while also noting the continued use of social engineering and compromise of private-sector entities (Chainalysis).

Crypto firms present an unusually attractive mix of characteristics: liquid assets, fast-moving operations, globally distributed teams, heavy use of chat platforms, and frequent contact with outsiders such as recruiters, investors, developers and market makers. Many employees also work on personal laptops, use browser wallet extensions and switch between consumer-grade and enterprise tools throughout the day. That creates many chances for a well-timed social-engineering lure to succeed.

Developers, DevOps staff, treasury personnel, executives and anyone with signing authority are particularly exposed. Recruiters and HR teams are also high-value targets because they routinely speak with unknown contacts and may be more willing to open files, test software or join calls with strangers.

Impact assessment

The immediate impact of this campaign is credential theft, session hijacking and malware infection. For an individual employee, that may mean stolen Telegram access, browser compromise, drained wallets or exposure of personal and corporate accounts. For an organization, the consequences can expand quickly: unauthorized access to cloud consoles, source code repositories, internal chat, customer data, exchange environments or treasury systems.

Severity is high for the crypto sector because even a single compromised workstation can lead to direct financial loss. Infostealers do not need domain admin privileges to be damaging. If they capture wallet data, API keys or authenticated sessions, the attacker may be able to move assets or stage a broader intrusion almost immediately. The business fallout can include incident response costs, regulatory scrutiny, legal exposure and reputational damage.

The wider implication is that video is no longer a reliable trust signal by itself. Organizations that adopted “verify by jumping on a quick call” as an anti-phishing habit need to revisit that assumption. A live face, a familiar account and a plausible technical excuse can now be combined into a convincing attack chain that defeats informal verification practices.

How to protect yourself

Do not run commands provided during a call. If someone on Zoom, Telegram or email asks you to paste text into PowerShell, Terminal, the Run dialog or your browser to fix audio, video or access issues, stop immediately. Legitimate meeting troubleshooting rarely requires command-line execution.

Verify identities out of band. If a contact asks for a meeting, software installation or urgent action, confirm through a second channel you already trust. Call a known company number, message a verified corporate account, or contact the person through an internal directory rather than replying in the same chat thread.

Treat Telegram and other messaging apps as untrusted for sensitive requests. A message from a familiar account is not proof that the sender controls it. Account takeover is part of the reported campaign.

Harden endpoint defenses. Use endpoint detection and response tools, restrict script execution where possible, and alert on suspicious PowerShell, shell and browser-console activity. Security teams should monitor for signs of infostealer behavior and unusual session reuse.

Use phishing-resistant MFA and device-bound sessions. FIDO2 security keys and stronger session controls reduce the value of stolen credentials. They do not eliminate the risk of token theft, but they make follow-on abuse harder.

Limit browser-stored secrets. Discourage storage of admin credentials, seed phrases, API keys and sensitive recovery material in browsers or plaintext files. Consider dedicated password managers and hardware-backed wallet workflows.

Segment high-risk roles. Staff with access to treasury systems, code repositories or production infrastructure should use separate admin accounts and, ideally, separate devices for sensitive work. Adding stronger hide.me VPN and access-control policies can help protect remote operations, but the bigger win is isolating privileged workflows.

Train specifically for ClickFix and deepfake-assisted social engineering. Generic phishing awareness is not enough. Employees should see examples of fake troubleshooting prompts, recruiter scams and video-call impersonation tactics.

Prepare an incident response plan for infostealers. If a user pastes a suspicious command or joins a dubious meeting, assume credential exposure. Reset passwords, revoke sessions, rotate tokens, review wallet access and isolate the host quickly.

The bottom line

This campaign shows how nation-state operators are blending familiar social engineering with newer forms of impersonation. The technical barrier is low; the psychological manipulation is the real weapon. For crypto firms, where a stolen session can translate into immediate financial loss, the threat is severe. The best defense is not just better malware detection, but stronger identity verification, tighter controls around privileged access and a hard rule that no one debugs a meeting by pasting commands from a stranger.

Share:

// FAQ

What is a ClickFix attack?

ClickFix is a social-engineering tactic that tricks a victim into fixing a fake technical problem by copying and pasting a malicious command into PowerShell, Terminal, the Run dialog or a browser console.

Why are deepfake video calls effective in these attacks?

They add credibility and lower suspicion. Attackers do not need a perfect deepfake; they only need a believable enough video presence to keep the target engaged and following instructions.

Why are crypto firms a frequent target for North Korean hackers?

Crypto firms hold liquid digital assets, often operate with distributed teams and rely heavily on chat and remote collaboration tools. A single compromised employee can expose wallets, sessions, cloud services or internal systems.

Can multi-factor authentication stop this kind of attack?

MFA helps, but it may not fully protect against infostealers that capture session cookies or tokens from an already authenticated browser. Stronger session controls and phishing-resistant MFA are better defenses.

// SOURCES

// RELATED

Singapore takes down Chinese hackers targeting telco networks
analysis

Singapore takes down Chinese hackers targeting telco networks

Singapore says Operation Cyber Guardian disrupted China-linked hackers targeting telecom networks, underscoring the espionage risk facing critical com

8 min readMar 21
Bitrefill points to Lazarus-linked Bluenoroff in suspected North Korean cyberattack
analysis

Bitrefill points to Lazarus-linked Bluenoroff in suspected North Korean cyberattack

Bitrefill says a recent cyberattack likely came from Lazarus-linked Bluenoroff, underscoring North Korea’s continued focus on crypto targets.

8 min readMar 20
Iran MOIS colludes with criminals to boost cyberattacks
analysis

Iran MOIS colludes with criminals to boost cyberattacks

Iran’s MOIS is reportedly working with cybercriminals, blurring espionage and extortion while making attribution and defense harder.

8 min readMar 20
Expect Iran to launch cyber-attacks globally, warns Google head of threat intel
analysis

Expect Iran to launch cyber-attacks globally, warns Google head of threat intel

Google’s threat intel chief warns Iran may expand deniable cyber-attacks globally, targeting the US, Gulf allies and critical sectors.

8 min readMar 20