North Korean Hackers Use AI Social Engineering in $100,000 Crypto Attack on Zerion

2 Sources

Share

North Korean-affiliated hackers used AI social engineering to steal $100,000 from crypto wallet company Zerion's hot wallets. The attack marks the second major DPRK-linked breach this month, following Drift Protocol's $280 million exploit. Security experts warn that AI-driven threats are making attacks more sophisticated and harder to detect.

North Korean Hackers Deploy AI-Enabled Social Engineering Attacks

Crypto wallet company Zerion became the latest victim of a sophisticated crypto attack orchestrated by North Korean hackers who leveraged artificial intelligence to execute a long-term social engineering operation. The breach, which resulted in approximately $100,000 stolen from the company's hot wallets last week, represents a troubling evolution in cyber threats targeting the cryptocurrency industry

1

.

Source: Cointelegraph

Source: Cointelegraph

In a post-mortem report released Wednesday, Zerion confirmed that attackers gained access to team members' logged-in sessions, credentials, and private keys to company hot wallets. While the stolen amount was relatively modest by crypto standards, the company emphasized that no user funds, Zerion apps, or infrastructure were compromised. As a precautionary measure, the web app was proactively disabled but is expected to be restored within 48 hours

2

.

Source: Gadgets 360

Source: Gadgets 360

Second Major DPRK-Linked Breach This Month

This incident marks the second AI social engineering attack linked to a DPRK threat actor this month. Earlier, Drift Protocol suffered a devastating $280 million exploit through what investigators described as a "structured intelligence operation" by DPRK-affiliated hackers. The pattern reveals a critical shift in cyber threats: North Korean operatives are now primarily targeting cryptocurrency firms through human vulnerabilities rather than exploiting smart contract bugs

1

.

"This incident showed that AI is changing the way cyber threats work," Zerion stated in their analysis. The company confirmed similarities between their breach and attacks investigated by the nonprofit Security Alliance (SEAL) last week

2

.

Tracking the UNC1069 Group's Sophisticated Campaigns

Security Alliance reported tracking and blocking 164 domains linked to the DPRK group UNC1069 during a two-month window from February to April. The group operates "multiweek, low-pressure social engineering campaigns" across platforms including Telegram, LinkedIn, and Slack. Malicious actors succeed by impersonating contacts, leveraging credible brand identities, or exploiting access to previously compromised company and individual accounts

1

.

According to SEAL's findings, "UNC1069's social engineering methodology is defined by patience, precision, and the deliberate weaponization of existing trust relationships." This approach allows attackers to build credibility over extended periods before executing their cyberattack

1

.

AI-Driven Threats Reshape the Security Landscape

Google's cybersecurity unit Mandiant detailed in February the group's use of fake Zoom meetings and confirmed use of AI tools for editing images or videos during the social engineering stage. This technological enhancement makes AI-driven threats increasingly difficult to detect and defend against. MetaMask developer and security researcher Taylor Monahan revealed earlier this month that North Korean IT workers have been embedding themselves in crypto companies and decentralized finance projects for at least seven years

1

.

Blockchain security firm Elliptic warned that "the evolution of the DPRK's social engineering techniques, combined with the increasing availability of AI to refine and perfect these methods, means the threat extends well beyond exchanges. Individual developers, project contributors, and anyone with access to cryptoasset infrastructure is a potential target"

1

.

Strengthening Defenses Against Evolving Threats

In response to the breach, Zerion announced comprehensive security enhancements. The company plans to strengthen internal policies for using credentials and authentication, invest in team security training, and accelerate security compliance initiatives. These measures reflect industry recognition that traditional security protocols must adapt to counter AI-enabled social engineering attacks

2

.

The incidents at both Zerion and Drift Protocol demonstrate that even established platforms remain vulnerable to sophisticated attacks that target cryptocurrency firms through human-focused tactics. As AI tools become more accessible and refined, security experts anticipate that these attacks will grow more targeted and harder to detect, requiring constant vigilance and updated security protocols across the entire crypto ecosystem.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo