Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Bitcoin miner Core Scientific shifts to AI with 1.5GW data center push

April 28, 2026

South Africa Crypto Draft Triggers 1M Rand Fine Warning From Valr CEO

April 28, 2026

Why moving IP on-chain is right for the entertainment industry

April 28, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures
North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures
Security and Privacy

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 28, 2026No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

A team of hackers associated to the North Korean-linked Lazarus Group has conducted a large-scale cyber theft campaign targeting over 100 cryptocurrency organizations across more than 20 countries, according to Arctic Wolf.

The spear-phishing campaign involved multiple social engineering techniques, including impersonating prominent figures of the fintech industry, typosquatted Zoom and Microsoft Teams meeting links, fake Calendly calendar invites and ClickFix-style clipboard injection attacks.

Arctic Wolf Labs researchers, who shared a detailed analysis of the full attack lifecycle in a report published on April 27, attributed the campaign “with high confidence” to BlueNoroff, a hacking team tied to the North Korea-linked Lazarus Group.

Spear-Phishing Via Typosquatted Links and Fake Meeting Invites

Arctic Wolf Labs first detected an intrusion by the attackers at a North American cryptocurrency company, beginning January 23, 2026.

The victim’s internal telemetry revealed a multi-stage execution chain initiated through a typosquatted Zoom meeting link delivered via a manipulated Calendly calendar invite.

When clicking the link, the victim was presented with a fake Zoom meeting interface that covertly exfiltrated their live camera feed to use as a lure in future attacks, while simultaneously deploying a ClickFix-style clipboard injection attack.

“A multi-stage credential extraction pipeline then plundered info from the victim’s device and browsers, focusing on cryptocurrency wallet extensions,” noted Arctic Wolf.

The initial attack commenced approximately five months after first contact with the primary victim.

However, the researchers noted that the execution chain itself swiftly progressed from initial click during a fake meeting to full system compromise in under five minutes. The threat actor reportedly kept access to the targeted systems for 66 days.

See also  Coinbase layer-2 network Base closes in on mainnet launch

A Spear-Phishing Campaign Spanning Over 20 Countries

When Arctic Wolf Labs researchers further analyzed the infrastructure supporting this operation and the trail left by the threat actor, they identified 100 additional targets whose compromised media was hosted on attacker infrastructure.

The geographic distribution of victims is spread across over 20 countries and five regions, with the heaviest concentration in the US (41%), followed by Singapore (11%) and the UK (7%).

A large proportion of the targets (80%) worked in crypto, blockchain finance or adjacent sectors, with 45% being CEOs or founders.

The researchers also observed over 80 typosquatted Zoom and Microsoft Teams domains (registered between late 2025 and March 2026) on the same infrastructure.

The threat group’s media server also hosted over 950 files, revealing “a self-sustaining deepfake pipeline,” in which exfiltrated victim webcam footage was merged with AI-generated images to create fake meeting content, said the Arctic Wolf report.

The researchers found evidence of a PowerShell-based command-and-control (C2) implant, an AES-encrypted browser injection payload and a Telegram Bot API screenshot exfiltration mechanism.

BlueNoroff, The Group Behind Lazarus’ Bangladesh Bank Heist

Some tools and parts of the infrastructure used in this campaign are consistent with that of a known fake conference campaign publicly attributed to BlueNoroff by Kaspersky and Huntress.

According to Arctic Wolf, BlueNoroff is a subgroup of the Lazarus Group and is known under many aliases, including APT38, Sapphire Sleet, TA444, Stardust Chollima, CageyChameleon and Nickel Gladstone.

In a January 2026 report by Picus Security, BlueNoroff is described as “the financial cybercrime arm of Lazarus,” which has itself been publicly attributed to the North Korea’s Reconnaissance General Bureau (RGB).

See also  South Korean Gov’t to ‘Completely Review’ Crypto Tax Law

Arctic Wolf stated that BlueNoroff has been active since at least 2014 and is focused on revenue generation through theft of cryptocurrency and financial assets.

The group first gained notoriety via the 2016 Bangladesh Bank Swift heist, in which the group attempted to steal $951m, successfully transferring $81m.

“The group has since pivoted toward targeting the cryptocurrency and web3 ecosystem through its long-running SnatchCrypto operation, which has been active since at least 2017,” added Arctic Wolf Labs researchers.

Source link

ClickFix Crypto Firms Hackers Korean lures North Target Zoom
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

South Africa Crypto Draft Triggers 1M Rand Fine Warning From Valr CEO

April 28, 2026

Ankit Tandon Named Vice Chairman of G6 Hospitality as PRISM Doubles Down on North American Growth

April 28, 2026

Trump tells top $TRUMP holders at Mar-a-Lago that crypto was created in America

April 28, 2026

The South Korean bank powering Upbit is testing Ripple integration for cross-border payments

April 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

USD₮ Goes Live on LINE Messenger, Driving Asia’s Stablecoin Growth

August 1, 2025

Operation Cronos: Who Are the LockBit Admins

February 23, 2024

SBF paints alternative view of his knowledge of the Fiat@ account in court

October 30, 2023

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Bitcoin miner Core Scientific shifts to AI with 1.5GW data center push

April 28, 2026

South Africa Crypto Draft Triggers 1M Rand Fine Warning From Valr CEO

April 28, 2026

Why moving IP on-chain is right for the entertainment industry

April 28, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$76,206.00-2.08%
  • ethereumEthereum(ETH)$2,272.48-1.92%
  • tetherTether(USDT)$1.00-0.01%
  • rippleXRP(XRP)$1.38-1.88%
  • binancecoinBNB(BNB)$622.20-0.71%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$83.46-2.04%
  • tronTRON(TRX)$0.323592-0.52%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.031.22%
  • dogecoinDogecoin(DOGE)$0.0986560.18%