ChainCatcher reports that, according to Cointelegraph, the U.S. cybersecurity firm Mandiant, a subsidiary of Google Cloud, has discovered that North Korea-linked threat groups are increasing social engineering attacks targeting cryptocurrency and fintech companies.
The threat group (codenamed UNC1069) has deployed seven malicious software suites, including newly discovered SILENCELIFT, DEEPBREATH, and CHROMEPUSH, aimed at obtaining sensitive data and stealing digital assets. The attackers exploit compromised Telegram accounts and use AI-generated deepfake videos to lure victims into fake Zoom meetings. Mandiant has been tracking this group since 2018, but advances in AI have helped the group expand its malicious activities since November 2025. In one intrusion, the attackers used stolen cryptocurrency founder Telegram accounts to initiate contact and employed a so-called ClickFix attack to trick victims into executing “troubleshooting” commands containing hidden instructions.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
iPhone Explodes with Critical Vulnerability "DarkSword": Hackers Can Steal Crypto Wallets and Private Keys, Crypto Users Become New Targets
Google's latest disclosure of the DarkSword iOS attack chain exploits multiple zero-day vulnerabilities, threatening the asset security of cryptocurrency users. This attack tool has been widely used by commercial spyware and nation-state hackers, capable of completely controlling iPhones and accessing crypto wallets and sensitive data. Research shows that up to 2.7 billion iPhone devices are affected, with risks particularly severe for users accustomed to using Web3. Although Apple has patched the vulnerabilities, the attack techniques remain replicable, and potential threats persist.
ChainNewsAbmedia58m ago
Ripple Clarifies: No Official Telegram as Scam Accounts Rise - U.Today
RippleX warns of increasing impersonation accounts on Telegram posing as Ripple representatives, emphasizing that Ripple does not have an official channel and urging XRP users to verify communications. The XRP Ledger is seeing record growth, with over 7.7 million holders, supported by favorable SEC regulations.
UToday2h ago
BONK.fun Restarts After Domain Hijacking, Confirms $30,000 in Damages
BONK.fun has resumed operations after a recent domain takeover incident that caused $30,000 in user losses. The attack, attributed to a third-party vendor's vulnerability, involved phishing tactics. Despite recovering the domain, risks remain as some antivirus software still flags it, and the BONK token price continues to decline.
TapChiBitcoin4h ago
Husband accuses wife of stealing over 2,000 bitcoins! Judge: The plaintiff has a very high chance of winning.
The UK High Court recently heard a Bitcoin theft case in which plaintiff Ping Fai Yuen accused his separated wife Fun Yung Li of stealing Bitcoin from his hardware wallet through secret surveillance, valued at approximately $176 million. Audio recordings and search warrant evidence supported the plaintiff's claims. The court maintained the asset freeze order but rejected certain claims. The judge found the plaintiff had an extremely high likelihood of success and recommended expediting the trial date.
区块客5h ago
FBI: Fake TRC20 FBI Token Scam Emerges, User Privacy and Security Sound New Alarms
The US FBI's New York office warned blockchain users to be vigilant if they receive TRC-20 tokens claiming to be associated with the FBI, and to avoid disclosing personal information. This scam uses a fake FBI identity to pressure victims into submitting data and directs them to phishing websites in order to commit asset fraud.
区块客10h ago
NFT Whale Under Attack Continues Moving Funds
Arkham reported that stolen funds were moved for the first time since March 6, 2026, with nearly $1 million DAI transferred. The theft stemmed from a violent attack on Ethereum NFT whale Sillytuna, resulting in $23.6 million stolen. Over $7 million remains traceable, illustrating a rise in real-world crypto thefts.
TapChiBitcoin12h ago