North Korean Hackers Target Crypto Users via Zoom
North Korean hackers use fake Zoom calls to steal crypto. Users warned to take urgent action if exposed.

- Hackers deploy malware via fake Zoom links.
- Malware targets crypto passwords and private keys.
- Users urged to secure wallets and reset all credentials.
In a fresh wave of cyberattacks, North Korean hackers are reportedly using fake Zoom meetings to compromise the security of cryptocurrency users. According to an alert from Security Alliance, attackers are luring unsuspecting victims into clicking on malicious Zoom links that secretly install malware.
This malware is specifically designed to extract sensitive data such as passwords, private keys, and crypto wallet credentials. The objective is clear: to hijack users’ digital assets and transfer them to untraceable wallets controlled by the hackers.
What to Do If You’ve Clicked the Link
If you’ve been exposed to one of these malicious Zoom links, immediate action is crucial:
- Disconnect your device from the internet to stop further data transmission.
- Transfer your crypto to a new wallet with new private keys.
- Change all passwords for your online accounts, especially email, crypto exchanges, and banking.
- Enable two-factor authentication (2FA) wherever possible.
- Perform a full memory wipe or system restore of the affected device before using it again.
These steps are necessary because the malware used is often persistent and can survive simple deletion or antivirus scans. Experts advise using a trusted security professional or tools to ensure the malware is fully removed.
Why Crypto Users Are Prime Targets
Crypto holders are increasingly in the crosshairs of sophisticated cybercrime groups. The decentralized nature of crypto means that once assets are stolen, they’re nearly impossible to recover. North Korean hackers, often linked to state-sponsored groups like Lazarus, have a history of attacking exchanges and users directly, aiming to fund the regime’s operations.
This latest tactic—fake Zoom meetings—adds another layer of social engineering, making users feel secure in a seemingly routine work or trading meeting. But once the link is clicked, the malware quietly invades, harvesting everything from login credentials to keystrokes.
Read Also :
- JPMorgan Launches Tokenized Money Market Fund on Ethereum
- Aptos Stablecoin Growth Surges with $386M Added
- Brazil’s Operation Kryptolaundry Uncovers $500M Crypto Fraud
- mETH Protocol Accelerates Fast, On-Demand ETH Redemptions and Yield Deployment via Buffer Pool Enhancement
- Crypto Fear & Greed Index Shows Extreme Fear at 16



