North Korea-Linked UNC1069 Uses AI-Powered Attacks to Target Cryptocurrency Organizations

Reviewed byNidhi Govil

5 Sources

Share

Google Mandiant reveals that UNC1069, a North Korea-linked threat actor, is deploying AI-powered attacks including deepfake Zoom calls and seven malware families to target cryptocurrency organizations. The sophisticated campaign uses compromised Telegram accounts and AI-generated lures to steal sensitive data, contributing to $2.02 billion in cryptocurrency thefts in 2025.

UNC1069 Deploys AI-Powered Attacks Against Cryptocurrency Organizations

The North Korea-linked hackers known as UNC1069 have escalated their operations against cryptocurrency organizations, deploying AI-powered attacks that combine deepfake technology with sophisticated malware to steal sensitive data and digital assets. According to a Google Mandiant report released this week, the threat actor—also tracked as CryptoCore and MASAN—has been active since at least April 2018 but recently incorporated AI-enabled social engineering tactics that make their campaigns significantly more dangerous

1

. The intrusion investigated by Mandiant relied on a compromised Telegram account, deepfake Zoom calls, and a ClickFix infection vector to deceive victims into installing malicious software on their systems

2

.

Source: Cointelegraph

Source: Cointelegraph

The scale of North Korea's cryptocurrency thefts continues to grow. Blockchain analytics firm Chainalysis reported that North Korea-linked hackers stole $2.02 billion in cryptocurrency in 2025, representing a 51% increase from the previous year

2

. The total amount stolen by DPRK-linked actors now stands at roughly $6.75 billion, even as the number of attacks has declined—indicating that targeting cryptocurrency companies with precision yields larger returns than mass campaigns.

AI-Enabled Social Engineering Through Deepfake Zoom Calls

The attack methodology employed by UNC1069 demonstrates how AI-generated lures can bypass traditional security measures. Victims are first approached via Telegram by attackers impersonating venture capitalists or using compromised accounts of legitimate entrepreneurs and startup founders

1

. Once contact is established, the threat actor uses Calendly to schedule a 30-minute meeting, then redirects the victim to a fake website masquerading as Zoom. The meeting link, often shared using Telegram's hyperlink feature to hide phishing URLs, presents victims with a fake video call interface that mirrors Zoom's legitimate appearance

3

.

What victims see during these deepfake Zoom calls is particularly concerning. In one documented case, the victim reported seeing what appeared to be a deepfake video of a well-known crypto CEO

2

. Kaspersky, which tracks the same campaign under the name GhostCall, discovered that some videos are either deepfakes or real recordings stealthily captured from other victims who had previously fallen prey to the scheme. "Their webcam footage had been unknowingly recorded, then uploaded to attacker-controlled infrastructure, and reused to deceive other victims, making them believe they were participating in a genuine live call," Kaspersky noted

1

.

Source: Hacker News

Source: Hacker News

Seven Malware Families Target Sensitive Data

The Google Mandiant report identifies seven unique malware families deployed in recent UNC1069 campaigns, including several new strains: SILENCELIFT, DEEPBREATH, and CHROMEPUSH

4

. During the fake meeting, victims are shown a bogus error message about audio issues and prompted to run troubleshooting commands—a ClickFix attack that triggers the infection chain

5

. On macOS systems, the commands deliver an AppleScript that drops a malicious Mach-O binary called WAVESHAPER, designed to gather system information and distribute a Go-based downloader codenamed HYPERCALL

1

.

DEEPBREATH manipulates macOS's Transparency, Consent, and Control (TCC) database to gain file system access, enabling it to steal iCloud Keychain credentials and data from Google Chrome, Brave, Microsoft Edge, Telegram, and the Apple Notes application

1

. CHROMEPUSH, written in C++, deploys as a browser extension to Google Chrome and Brave browsers by masquerading as a tool for editing Google Docs offline, with capabilities to record keystrokes, observe username and password inputs, and extract browser data including session tokens

5

.

Targeting the Web3 Industry and Venture Capital Firms

Since at least 2023, UNC1069 has shifted from spear-phishing techniques and traditional finance targeting towards the Web3 industry, including centralized exchanges, software developers at financial institutions, high-technology companies, and individuals at venture capital firms

1

. Mandiant observed the group "employing these techniques to target both corporate entities and individuals within the cryptocurrency industry, including software firms and their developers, as well as venture capital firms and their employees or executives"

3

.

The volume of tooling deployed on a single host indicates a highly determined effort to harvest credentials, browser data, and session tokens to facilitate financial theft. Fraser Edwards, co-founder and CEO of decentralized identity firm cheqd, emphasized that the attack reflects a pattern targeting people whose jobs depend on remote meetings and rapid coordination. "The effectiveness of this approach comes from how little has to look unusual. The sender is familiar. The meeting format is routine. There is no malware attachment or obvious exploit. Trust is leveraged before any technical defence has a chance to intervene," Edwards explained

2

.

Generative AI Tools Enable Scaled Operations

Google Threat Intelligence Group previously reported in November 2025 that UNC1069 began using generative AI tools like Gemini to produce lure material and messaging related to cryptocurrency as part of efforts to support its social engineering campaigns

1

. The group attempted to misuse Gemini to develop code to steal cryptocurrency and leverage deepfakes mimicking individuals in the cryptocurrency industry to distribute a backdoor called BIGMACHO by passing it off as a Zoom software development kit

3

.

Edwards warned that the risk will increase as AI agents are introduced into everyday communication and decision-making. "Agents can send messages, schedule calls, and act on behalf of users at machine speed. If those systems are abused or compromised, deepfake audio or video can be deployed automatically, turning impersonation from a manual effort into a scalable process," he said

2

. The attacks serve a dual purpose: enabling cryptocurrency theft while fueling future social engineering campaigns by leveraging victim's identity and data

3

.

Source: Decrypt

Source: Decrypt

Cryptocurrency businesses remain attractive targets due to direct access to funds, remote communication workflows that make impersonation easier, and irreversible blockchain transactions that make stolen crypto difficult to recover

5

. Earlier in 2025, four North Korean operatives infiltrated crypto startups as freelance developers, stealing nearly $900,000, while the Lazarus Group was linked to the $1.4 billion Bybit hack

4

.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo