Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
BlueNoroff Targets Cryptocurrency Through Fake Zoom Meetings

BlueNoroff Targets Cryptocurrency Through Fake Zoom Meetings

Posted on April 29, 2026 By CWS

A sophisticated cyber attack from North Korea’s Lazarus Group, specifically the BlueNoroff subgroup, is targeting cryptocurrency and Web3 professionals. This campaign uses a combination of fake Zoom meeting interfaces, fileless PowerShell scripts, and AI-generated deepfake content.

BlueNoroff’s Techniques and Targets

BlueNoroff, known for its focus on financial gain through digital asset theft, has launched attacks in over 20 countries, with the United States accounting for 41% of the victims. The group’s strategy involves spear-phishing emails where attackers pose as legal professionals from the Fintech sector, inviting targets to a meeting via Calendly.

Upon confirming the meeting, the genuine Google Meet link is replaced with a fake Zoom URL that closely mimics the real one. Victims are led to a deceptive HTML page mimicking the Zoom interface, complete with artificial participant videos and speaker indicators.

Execution and Impact of the Attacks

Arctic Wolf analysts have traced a specific attack on a North American Web3 company back to BlueNoroff. This attack, attributed to APT38, also known as Sapphire Sleet or Stardust Chollima, quickly compromises systems within minutes. The attackers maintain access for over two months, obtaining sensitive information like browser credentials and webcam footage, which are then used to craft more convincing lures.

The campaign stands out due to its use of a self-sustaining deepfake production system. Researchers found nearly 950 files on the attackers’ server, including AI-generated images and deepfake videos, all verified through cryptographic metadata as outputs from OpenAI’s GPT-4o model.

Protective Measures and Recommendations

Victims of these attacks often unknowingly participate in a ClickFix-style clipboard injection attack. During the fake Zoom meeting, users are prompted to update their SDK, leading to the execution of hidden PowerShell commands. These commands install a persistent beacon that communicates with the attackers’ server every five seconds, gathering extensive system data.

Organizations involved in Web3, cryptocurrency, and financial services are advised to verify meeting links through secondary means before joining. It’s crucial to remember that legitimate platforms don’t require terminal commands for resolving audio or camera issues. Security teams should block identified C2 addresses, remove suspicious shortcuts, and rotate any exposed credentials.

Enabling PowerShell Script Block Logging on endpoints can help in the early detection of such obfuscated payloads. Immediate action is necessary to secure sensitive information and prevent future breaches.

Cyber Security News Tags:AI-generated lures, APT38, BlueNoroff, Cryptocurrency, cyber attack tactics, Cybersecurity, Deepfake, digital assets, financial security, Lazarus Group, Phishing, PowerShell, spear-phishing, Web3, Zoom

Post navigation

Previous Post: Major GitHub Flaw Endangered Millions of Repositories
Next Post: cPanel Issues Urgent Fix for Critical Security Flaw

Related Posts

GlassWorm Campaign Expands via Malicious VSX Extensions GlassWorm Campaign Expands via Malicious VSX Extensions Cyber Security News
Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection Cyber Security News
Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions Cyber Security News
Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cyber Security News
Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting Cyber Security News
Microsoft Upgrades .NET Bounty Program with Rewards Up to ,000 Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Group Handala Threatens US Troops in Bahrain
  • Vect 2.0 RaaS Threatens Global Cybersecurity
  • Chrome and Firefox Release Crucial Security Updates
  • CISA Identifies Critical Flaws in ConnectWise and Windows
  • cPanel Issues Urgent Fix for Critical Security Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Group Handala Threatens US Troops in Bahrain
  • Vect 2.0 RaaS Threatens Global Cybersecurity
  • Chrome and Firefox Release Crucial Security Updates
  • CISA Identifies Critical Flaws in ConnectWise and Windows
  • cPanel Issues Urgent Fix for Critical Security Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark