North Korean Hackers Target Crypto Users via Zoom
North Korean hackers use fake Zoom calls to steal crypto. Users warned to take urgent action if exposed.

- Hackers deploy malware via fake Zoom links.
- Malware targets crypto passwords and private keys.
- Users urged to secure wallets and reset all credentials.
In a fresh wave of cyberattacks, North Korean hackers are reportedly using fake Zoom meetings to compromise the security of cryptocurrency users. According to an alert from Security Alliance, attackers are luring unsuspecting victims into clicking on malicious Zoom links that secretly install malware.
This malware is specifically designed to extract sensitive data such as passwords, private keys, and crypto wallet credentials. The objective is clear: to hijack users’ digital assets and transfer them to untraceable wallets controlled by the hackers.
What to Do If You’ve Clicked the Link
If you’ve been exposed to one of these malicious Zoom links, immediate action is crucial:
- Disconnect your device from the internet to stop further data transmission.
- Transfer your crypto to a new wallet with new private keys.
- Change all passwords for your online accounts, especially email, crypto exchanges, and banking.
- Enable two-factor authentication (2FA) wherever possible.
- Perform a full memory wipe or system restore of the affected device before using it again.
These steps are necessary because the malware used is often persistent and can survive simple deletion or antivirus scans. Experts advise using a trusted security professional or tools to ensure the malware is fully removed.
Why Crypto Users Are Prime Targets
Crypto holders are increasingly in the crosshairs of sophisticated cybercrime groups. The decentralized nature of crypto means that once assets are stolen, they’re nearly impossible to recover. North Korean hackers, often linked to state-sponsored groups like Lazarus, have a history of attacking exchanges and users directly, aiming to fund the regime’s operations.
This latest tactic—fake Zoom meetings—adds another layer of social engineering, making users feel secure in a seemingly routine work or trading meeting. But once the link is clicked, the malware quietly invades, harvesting everything from login credentials to keystrokes.
Read Also :
- Binance Whale Loses $11.58M as Bitcoin Dips Below $86K
- Gensyn Launches $AI Token Sale on Sonar
- Aster Launches Shield Mode, a Protected High-Performance Trading Mode for On-Chain Traders
- SEC Slows Down Crypto Crackdown Under Trump 2.0
- Geode Lists GEODE Coin on BitMart.com as Part of Ongoing Decentralized Infrastructure Expansion



