Man könnte sagen, die Kühnheit moderner Schurken kennt keine Grenzen! 🧐
- Lazarus Group, those North Korean cyber-scoundrels, target crypto founders with fake Zoom calls.
- Hackers, with a touch of theatrical flair, use pre-recorded footage to impersonate trusted contacts. Heavens, what will they think of next?
The Lazarus Group, a cybercrime syndicate with connections most unsavory, dared to target Mr. Kenny Li, co-founder of Manta Network.
The attack, carried out with the cunning of a fox, involved a fake Zoom call intended to pilfer cryptocurrency assets with malicious software.
One shudders to think of such unscrupulous behavior. 😨
On the 17th of April in the year 2025, an incident most curious unfolded. The hackers, posing as a trusted contact on Telegram (a most modern form of correspondence), scheduled a Zoom meeting.
During the call, Mr. Li, with commendable prudence, noticed strange prompts. A request for camera access, and a script file download – alarms, indeed, were set off!
He promptly deleted their messages and quit the meeting, later discovering the contact had blocked him. Such impudence! 😠
Mr. Li’s experience is, alas, part of a growing trend of Zoom-based attacks against the crypto community. These tactics, linked to the Lazarus Group by cybersecurity experts, exploit vulnerabilities in Web3 infrastructure.
One can only lament the state of affairs. 😔
Finger weg von langweiligen Regierungsdebatten! 😴 Hier gibt's nur heiße Krypto-News und Sarkasmus! 💥😎
👉Bereit für den Spaß? Klick auf "Beitreten"! 📲
How Lazarus Exploits Zoom for Crypto Scams
The attack on Mr. Li involved a fake Zoom call, using pre-recorded footage from previous meetings. Presumably obtained by compromising team members’ accounts.
The audio, most inconveniently, did not function. Familiar faces were shown, mimicking a legitimate meeting, before a prompt to download a script file appeared. How very… theatrical.🎭
This tactic bears a striking resemblance to previously reported Zoom scams. SlowMist, in a 2024 investigation, discovered hackers using fake Zoom interfaces to trick users into downloading malware.
These malicious files steal system data, browser cookies, and cryptocurrency wallet credentials, sending them to the attackers‘ remote server. The cheek of it! 😤
The Lazarus Group’s methods have shifted from brute force to social engineering, circumventing traditional security measures. These attacks are particularly perilous for crypto founders and developers, as they impersonate trusted contacts and use realistic visuals to exploit human error.
One must be ever vigilant! 🧐
This is not the only incident of its kind in the crypto space. A user from Vow | ContributionDAO experienced a near-identical situation on April 18, 2025, when attackers, masquerading as a blockchain team, demanded a specific Zoom link.
The attackers, most oddly, vanished when the user suggested switching to Google Meet. Fickle, indeed! 👻
These attacks grow ever more sophisticated, and the crypto community raises the alarm. Such scams can become exceedingly convincing when crafted with deepfake technology or pre-recorded footage.
Thus, users must maintain the utmost vigilance. One cannot be too careful in these modern times. 😟
KiloEx Recovers $7.5M After Separate Exploit
In related news, decentralized exchange KiloEx has, most fortunately, recovered $7.5 million after a hacking incident. On April 18th, 2025, the platform announced the attacker had returned the funds, stolen four days prior, following negotiations for a bounty deal. A most amicable arrangement, one might say. 🤔
The exploit stemmed from a manipulated price oracle, a well-known vulnerability in decentralized finance platforms. KiloEx engaged SlowMist and Sherlock, among other cybersecurity firms, to trace the attack.
The platform temporarily suspended operations but reassured users that no funds were ultimately lost. A happy ending, at least. 😊
KiloEx has since closed the case, opting not to pursue legal action against the hacker. The incident serves as a timely reminder that vulnerabilities in smart contracts and oracles remain prime targets for cybercriminals in the DeFi sector.
One hopes lessons have been learned. 🙏
Weiterlesen
- Das überraschende Ende des Konklaves hat eine tiefere Bedeutung
- Lisa Snowdon, 52, zeigt ihre dem Alter trotzende Figur in einem knappen lila Bikini, während sie auf Mallorca die Sonne genießt
- Madison Bailey von Outer Banks weint, während sie sich von Rudy Pankow verabschiedet
- „Wir sehen, dass die Rezessionsindikatoren rot blinken“, warnt der Präsident von Rosenberg Research
- Top 5 Immobilien-Tokenisierungsplattformen
- 27 Horrorkomödien, die wirklich lustig sind
- Eminems Familienführer in Fotos: Lernen Sie seine Kinder, seine Ex-Frau und seine Mutter kennen
- Was ist real und was nicht im surrealen Ende von Never Let Go?
- Bybit ist jetzt ein registrierter VASP in Argentinien
- EU-Wertpapieraufsichtsbehörde: 10 Börsen dominieren 90 % des Kryptohandels
2025-04-23 06:46