Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korea-Linked UNC1069 Targets Crypto with AI Attacks

North Korea-Linked UNC1069 Targets Crypto with AI Attacks

Posted on February 11, 2026 By CWS

The North Korea-affiliated cyber threat group known as UNC1069 has emerged as a significant risk to the cryptocurrency industry. This group is reportedly using sophisticated techniques to infiltrate Windows and macOS systems, primarily to commit financial theft. Their operations involve intricate social engineering tactics, including the use of AI-generated content and fake Zoom meetings.

AI and Social Engineering Tactics

UNC1069 employs a blend of AI tools and social engineering to deceive targets within the cryptocurrency sector. According to researchers Ross Inman and Adrian Hernandez from Google Mandiant, the group exploits compromised Telegram accounts and fake video meetings to launch their attacks. By leveraging AI-generated videos, they enhance their ability to mislead victims into believing they are engaging with legitimate business personnel.

Having been active since at least April 2018, UNC1069 has consistently utilized social engineering strategies to achieve financial gain. These strategies often involve impersonating investors from well-known companies on platforms like Telegram. The cybersecurity community also recognizes this group under the names CryptoCore and MASAN.

Advanced Malware Deployment

Recent findings by Google Threat Intelligence Group highlight UNC1069’s use of AI tools, such as Gemini, to create deceptive materials related to cryptocurrency. These tools are part of a broader effort to support their social engineering campaigns. The group has also attempted to misuse AI for developing code aimed at cryptocurrency theft, often utilizing deepfake technology to impersonate industry professionals.

In the latest campaign, UNC1069 introduced several new malware families, including SILENCELIFT, DEEPBREATH, and CHROMEPUSH. These malware variants are deployed through fake Zoom meeting links, which redirect victims to counterfeit websites designed to capture sensitive information. Once inside a system, the malware facilitates data theft and further system compromise.

Impact and Future Threats

UNC1069’s tactics involve tricking victims into downloading malicious software disguised as troubleshooting commands. This allows the group to install multiple layers of malware, such as WAVESHAPER and HYPERCALL, which enable further infiltration and data extraction. The suite of tools employed by UNC1069 is designed to harvest credentials, browser data, and session tokens, supporting their financial theft objectives.

As UNC1069 continues to evolve its strategies, the focus has shifted towards targeting entities within the Web3 industry, including centralized exchanges and high-tech firms. The group’s ability to deploy new malware families alongside existing threats indicates a notable expansion in their capabilities. Organizations in the cryptocurrency space must remain vigilant and enhance their security measures to counter these sophisticated threats.

In conclusion, the activities of UNC1069 underscore the growing complexity of cyber threats facing the cryptocurrency sector. By incorporating advanced AI techniques and deploying a variety of malware, this group poses a substantial risk to financial institutions and technology companies. Ongoing vigilance and robust cybersecurity strategies are essential to mitigate the impact of such threats.

The Hacker News Tags:AI, Cryptocurrency, Cybersecurity, Deepfake, Malware, North Korea, Phishing, social engineering, UNC1069, Zoom attacks

Post navigation

Previous Post: GitLab Releases Critical Security Updates to Fix Vulnerabilities
Next Post: Siemens, Schneider, and Others Address ICS Vulnerabilities

Related Posts

DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft The Hacker News
Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to 2M in Damages Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages The Hacker News
Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat The Hacker News
AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto The Hacker News
Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories The Hacker News
5 Ways Identity-based Attacks Are Breaching Retail 5 Ways Identity-based Attacks Are Breaching Retail The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark