Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korea-Linked UNC1069 Targets Crypto with AI Attacks

North Korea-Linked UNC1069 Targets Crypto with AI Attacks

Posted on February 11, 2026 By CWS

The North Korea-affiliated cyber threat group known as UNC1069 has emerged as a significant risk to the cryptocurrency industry. This group is reportedly using sophisticated techniques to infiltrate Windows and macOS systems, primarily to commit financial theft. Their operations involve intricate social engineering tactics, including the use of AI-generated content and fake Zoom meetings.

AI and Social Engineering Tactics

UNC1069 employs a blend of AI tools and social engineering to deceive targets within the cryptocurrency sector. According to researchers Ross Inman and Adrian Hernandez from Google Mandiant, the group exploits compromised Telegram accounts and fake video meetings to launch their attacks. By leveraging AI-generated videos, they enhance their ability to mislead victims into believing they are engaging with legitimate business personnel.

Having been active since at least April 2018, UNC1069 has consistently utilized social engineering strategies to achieve financial gain. These strategies often involve impersonating investors from well-known companies on platforms like Telegram. The cybersecurity community also recognizes this group under the names CryptoCore and MASAN.

Advanced Malware Deployment

Recent findings by Google Threat Intelligence Group highlight UNC1069’s use of AI tools, such as Gemini, to create deceptive materials related to cryptocurrency. These tools are part of a broader effort to support their social engineering campaigns. The group has also attempted to misuse AI for developing code aimed at cryptocurrency theft, often utilizing deepfake technology to impersonate industry professionals.

In the latest campaign, UNC1069 introduced several new malware families, including SILENCELIFT, DEEPBREATH, and CHROMEPUSH. These malware variants are deployed through fake Zoom meeting links, which redirect victims to counterfeit websites designed to capture sensitive information. Once inside a system, the malware facilitates data theft and further system compromise.

Impact and Future Threats

UNC1069’s tactics involve tricking victims into downloading malicious software disguised as troubleshooting commands. This allows the group to install multiple layers of malware, such as WAVESHAPER and HYPERCALL, which enable further infiltration and data extraction. The suite of tools employed by UNC1069 is designed to harvest credentials, browser data, and session tokens, supporting their financial theft objectives.

As UNC1069 continues to evolve its strategies, the focus has shifted towards targeting entities within the Web3 industry, including centralized exchanges and high-tech firms. The group’s ability to deploy new malware families alongside existing threats indicates a notable expansion in their capabilities. Organizations in the cryptocurrency space must remain vigilant and enhance their security measures to counter these sophisticated threats.

In conclusion, the activities of UNC1069 underscore the growing complexity of cyber threats facing the cryptocurrency sector. By incorporating advanced AI techniques and deploying a variety of malware, this group poses a substantial risk to financial institutions and technology companies. Ongoing vigilance and robust cybersecurity strategies are essential to mitigate the impact of such threats.

The Hacker News Tags:AI, Cryptocurrency, Cybersecurity, Deepfake, Malware, North Korea, Phishing, social engineering, UNC1069, Zoom attacks

Post navigation

Previous Post: GitLab Releases Critical Security Updates to Fix Vulnerabilities
Next Post: Siemens, Schneider, and Others Address ICS Vulnerabilities

Related Posts

Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence The Hacker News
FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware The Hacker News
Secure Vibe Coding: The Complete New Guide Secure Vibe Coding: The Complete New Guide The Hacker News
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach The Hacker News
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware The Hacker News
CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News