Mandiant: North Korean hacking groups are increasing social engineering attacks targeting cryptocurrency and fintech companies

ChainCatcher reports that, according to Cointelegraph, the U.S. cybersecurity firm Mandiant, a subsidiary of Google Cloud, has discovered that North Korea-linked threat groups are increasing social engineering attacks targeting cryptocurrency and fintech companies.

The threat group (codenamed UNC1069) has deployed seven malicious software suites, including newly discovered SILENCELIFT, DEEPBREATH, and CHROMEPUSH, aimed at obtaining sensitive data and stealing digital assets. The attackers exploit compromised Telegram accounts and use AI-generated deepfake videos to lure victims into fake Zoom meetings. Mandiant has been tracking this group since 2018, but advances in AI have helped the group expand its malicious activities since November 2025. In one intrusion, the attackers used stolen cryptocurrency founder Telegram accounts to initiate contact and employed a so-called ClickFix attack to trick victims into executing “troubleshooting” commands containing hidden instructions.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Cosmos discovers security vulnerability affecting some EVM Stack blockchains, Saga has released a patch

Gate News Announcement, March 10th, Cosmos Labs disclosed that a security vulnerability has been recently discovered, affecting some blockchains built on the Cosmos EVM Stack. This vulnerability has impacted Layer 1 blockchains in the production environment.

GateNews6m ago

Bing AI search results poisoned, malicious OpenClaw installer stealing confidential information

Slow Mist Technology warns that attackers are poisoning Bing AI search results to promote fake OpenClaw installers, tricking users into downloading malware. Attackers are using GitHub to create fake repositories, simply hosting malicious code on the platform to contaminate search results. On Windows and macOS, the malware employs specific intrusion methods and can steal sensitive information. Users should avoid downloads from unknown sources and stay vigilant.

MarketWhisper35m ago

Gondi initiates compensation after $230,000 vulnerability, recovers stolen NFTs and returns them to the original owner

NFT Lending Protocol Gondi Announces Compensation for Users Who Suffered Losses Due to Smart Contract Vulnerability, with Approximately 78 NFTs stolen, estimated at around $230,000. The vulnerability stemmed from a logical flaw in the "Sell & Repay" contract, allowing attackers to transfer NFTs without owning them. Gondi is currently compensating users through a three-pronged approach: contacting affected users, recovering stolen NFTs, and repurchasing similar items using the proceeds. Other platform functions have returned to normal.

MarketWhisper52m ago

Attackers poison Bing AI search results, forging OpenClaw programs to steal crypto assets

Gate News Report, March 10th, SlowMist Technology Chief Information Security Officer 23pds posted on the X platform that attackers have launched poisoning attacks on Bing AI search results, tricking users into downloading and installing counterfeit OpenClaw programs, thereby stealing users' crypto assets and sensitive information.

GateNews2h ago

NFT platform Gondi suffers contract vulnerability attack, loses $230,000, promises full compensation to affected users

NFT platform Gondi was subjected to a contract vulnerability attack on March 10th, resulting in the theft of 78 NFTs and a loss of approximately $230,000. The issue stemmed from a logical flaw in the new version of the Sell & Repay contract. Gondi has taken control of the situation, disabled related functions, is actively compensating affected users, and is pursuing the stolen NFTs.

GateNews2h ago

NFT liquidity trading platform gondixyz attacked, approximately $230,000 lost

Gate News Report, March 9 — According to Goplus monitoring, the NFT liquidity trading platform gondixyz was hacked due to a vulnerability, resulting in the theft of multiple NFTs with estimated losses of approximately $230,000. gondixyz official statement: "Please do not repay loans until the team confirms safety." Users are advised to immediately revoke approvals for affected contracts via Revoke Cash and refrain from initiating any new activities on the platform.

GateNews13h ago
Comment
0/400
No comments