Deepfake Deception: North Korean Hackers Target Web3 Employee via Zoom Malware Scam

Listen to this Post

Featured Image

Introduction: Cyber Espionage Meets Deepfake Manipulation

In a chilling evolution of cybercrime, a North Korea-affiliated hacking group known as BlueNoroff has executed a sophisticated malware campaign aimed at the cryptocurrency and Web3 sector. By exploiting human trust through social engineering and AI-powered deepfakes, the attackers impersonated company executives on Zoom calls, ultimately deceiving a targeted employee into installing malware on a macOS device. This brazen act is a stark reminder of how nation-state actors are raising the stakes in digital warfare.

The Attack Unfolded: How BlueNoroff Executed Their Scheme

The incident began with a simple Telegram message to an unsuspecting employee at a cryptocurrency foundation. The attacker, posing as a professional contact, shared a Calendly link that ostensibly led to a Google Meet call. However, this link redirected the user to a fraudulent Zoom domain under the threat actor’s control.

After weeks of deceptive coordination, the employee joined a Zoom call that included deepfaked video participants—cloned versions of known company executives. When the employee reported issues with their microphone, the fakes urged them to install a Zoom “support” extension. This malicious link, shared over Telegram, triggered the download of a file titled zoom_sdk_support.scpt.

This AppleScript initially opened a legitimate Zoom SDK webpage to establish credibility, but in the background, it downloaded a secondary payload from support[.]us05web-zoom[.]biz. The script disabled bash history logs, installed Rosetta 2 if needed (to run x86 apps on Apple silicon Macs), created hidden directories, and fetched more malicious files from remote domains. These included binaries like:

Telegram 2: A Nim-based backdoor

Root Troy V4: A Go-based malware to run remote scripts

InjectWithDyld: A loader used to deliver additional implants

XScreen: A keylogger and screen/clipboard monitor

CryptoBot: A tool to collect cryptocurrency-related data

NetChk: A decoy binary generating random numbers

Ultimately, the malware exfiltrated data and allowed full remote access. Huntress Labs, which investigated the breach, found eight unique malicious binaries planted on the infected host.

BlueNoroff, also known as TA444, Stardust Chollima, or APT38, is a subset of North Korea’s elite Lazarus Group, long known for cyber heists against banks, ATMs, and crypto platforms. Notably, the group is behind the TraderTraitor campaign that breached Bybit in February 2025 and Axie Infinity in March 2022.

As North Korea’s hacking apparatus evolves, analysts note that APT38 has likely splintered into more agile units like TraderTraitor and CryptoCore, which now carry the torch of financial cyber theft. These splinters have launched increasingly sophisticated attacks using fake job interviews and system issue alerts, often disguised through trustworthy platforms such as Coinbase and Robinhood.

In the newer ClickFake Interview campaigns, victims are tricked into copying malware disguised as interview support commands. These cross-platform attacks deploy GolangGhost and its Python variant, PylangGhost, to infiltrate devices, harvest cookies, credentials, and more—especially targeting users in India.

What Undercode Say: 🔍 Analysis of the BlueNoroff Attack and its Impact

Threat Actor Profile: BlueNoroff’s Signature Style

Undercode’s threat intelligence experts observe that BlueNoroff consistently combines social engineering with technical sophistication. This case exemplifies their modus operandi: using realistic executive deepfakes, exploiting trusted communication tools like Calendly, and delivering tailored malware with multi-stage payloads.

Deepfakes: The New Weapon in Cyber Espionage

The use of AI-generated video impersonations marks a critical shift. Deepfakes were once seen as disinformation tools, but BlueNoroff has weaponized them to breach enterprise defenses. The fake Zoom meeting wasn’t just a clever ruse—it was a psychological trap exploiting familiarity and urgency to lower the target’s guard.

Multistage Malware and Evasion

The script not only performed initial reconnaissance but also took steps to erase evidence, like wiping command histories. The deployment of Rosetta 2 to ensure malware compatibility across Apple architectures shows deep technical insight. Additionally, hiding binaries in /tmp and naming files like icloud_helper are classic stealth tactics.

Target Profile: Why Web3 is in the Crosshairs

Cryptocurrency organizations are often decentralized, fast-moving, and rely on remote communication tools—making them ideal targets. Employees working from home or across borders are less likely to verify face-to-face interactions, giving attackers an edge in social engineering.

Fragmentation of DPRK Cyber Forces

The disbanding of APT38 into TraderTraitor and CryptoCore reflects a broader trend: decentralization for agility. Smaller units can target diverse regions with localized campaigns. For instance, TraderTraitor continues to build cryptocurrency malware, while CryptoCore leverages credential theft through phishing and malware-laced documents.

Fake Interview Campaigns: A Trend to Watch

BlueNoroff’s ClickFake campaigns underscore a dangerous evolution. Impersonating job offers from Coinbase or Robinhood to distribute malware disguised as “technical tests” shows a blending of career and cybercrime narratives—a unique form of psychological manipulation.

Implications for macOS Security

macOS, long considered less vulnerable, is now firmly in the crosshairs. The adoption of Go, Swift, Nim, and Objective-C in payloads demonstrates advanced cross-language engineering. This undermines the false sense of security many macOS users maintain.

Key Takeaway for Organizations

Companies must move beyond basic awareness training. Deepfake simulations, enhanced device-level threat monitoring, and endpoint detection tailored for macOS are crucial. Organizations should also verify any calls or meetings that involve unexpected requests for installations.

✅ Fact Checker Results

✅ Verified: The malware used real Zoom SDK pages to trick users into trusting the installation.
✅ Verified: BlueNoroff is a well-documented sub-group of Lazarus involved in major crypto heists.
❌ False Claim: macOS systems are inherently safe from APT-level attacks — this case disproves that.

🔮 Prediction

As deepfake technology becomes more accessible, expect an increase in executive impersonation attacks across all industries, not just Web3. North Korea-linked groups will likely continue exploiting remote work tools and interview scams, blending social trust with technical infiltration. Businesses should anticipate hybrid threats combining fake personas, tailored malware, and personalized lures—demanding a new era of cyber defense built on AI threat detection, behavioral analysis, and digital identity verification.

References:

Reported By: thehackernews.com
Extra Source Hub:
https://www.reddit.com/r/AskReddit
Wikipedia
OpenAi & Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram