Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korea-Linked UNC1069 Targets Crypto with AI Attacks

North Korea-Linked UNC1069 Targets Crypto with AI Attacks

Posted on February 11, 2026 By CWS

The North Korea-affiliated cyber threat group known as UNC1069 has emerged as a significant risk to the cryptocurrency industry. This group is reportedly using sophisticated techniques to infiltrate Windows and macOS systems, primarily to commit financial theft. Their operations involve intricate social engineering tactics, including the use of AI-generated content and fake Zoom meetings.

AI and Social Engineering Tactics

UNC1069 employs a blend of AI tools and social engineering to deceive targets within the cryptocurrency sector. According to researchers Ross Inman and Adrian Hernandez from Google Mandiant, the group exploits compromised Telegram accounts and fake video meetings to launch their attacks. By leveraging AI-generated videos, they enhance their ability to mislead victims into believing they are engaging with legitimate business personnel.

Having been active since at least April 2018, UNC1069 has consistently utilized social engineering strategies to achieve financial gain. These strategies often involve impersonating investors from well-known companies on platforms like Telegram. The cybersecurity community also recognizes this group under the names CryptoCore and MASAN.

Advanced Malware Deployment

Recent findings by Google Threat Intelligence Group highlight UNC1069’s use of AI tools, such as Gemini, to create deceptive materials related to cryptocurrency. These tools are part of a broader effort to support their social engineering campaigns. The group has also attempted to misuse AI for developing code aimed at cryptocurrency theft, often utilizing deepfake technology to impersonate industry professionals.

In the latest campaign, UNC1069 introduced several new malware families, including SILENCELIFT, DEEPBREATH, and CHROMEPUSH. These malware variants are deployed through fake Zoom meeting links, which redirect victims to counterfeit websites designed to capture sensitive information. Once inside a system, the malware facilitates data theft and further system compromise.

Impact and Future Threats

UNC1069’s tactics involve tricking victims into downloading malicious software disguised as troubleshooting commands. This allows the group to install multiple layers of malware, such as WAVESHAPER and HYPERCALL, which enable further infiltration and data extraction. The suite of tools employed by UNC1069 is designed to harvest credentials, browser data, and session tokens, supporting their financial theft objectives.

As UNC1069 continues to evolve its strategies, the focus has shifted towards targeting entities within the Web3 industry, including centralized exchanges and high-tech firms. The group’s ability to deploy new malware families alongside existing threats indicates a notable expansion in their capabilities. Organizations in the cryptocurrency space must remain vigilant and enhance their security measures to counter these sophisticated threats.

In conclusion, the activities of UNC1069 underscore the growing complexity of cyber threats facing the cryptocurrency sector. By incorporating advanced AI techniques and deploying a variety of malware, this group poses a substantial risk to financial institutions and technology companies. Ongoing vigilance and robust cybersecurity strategies are essential to mitigate the impact of such threats.

The Hacker News Tags:AI, Cryptocurrency, Cybersecurity, Deepfake, Malware, North Korea, Phishing, social engineering, UNC1069, Zoom attacks

Post navigation

Previous Post: GitLab Releases Critical Security Updates to Fix Vulnerabilities
Next Post: Siemens, Schneider, and Others Address ICS Vulnerabilities

Related Posts

RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories The Hacker News
MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign The Hacker News
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors The Hacker News
Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment The Hacker News
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls The Hacker News
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Socelars Malware Targets Windows for Data Theft
  • Siemens, Schneider, and Others Address ICS Vulnerabilities
  • North Korea-Linked UNC1069 Targets Crypto with AI Attacks
  • GitLab Releases Critical Security Updates to Fix Vulnerabilities
  • Critical Windows Notepad Flaw Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Socelars Malware Targets Windows for Data Theft
  • Siemens, Schneider, and Others Address ICS Vulnerabilities
  • North Korea-Linked UNC1069 Targets Crypto with AI Attacks
  • GitLab Releases Critical Security Updates to Fix Vulnerabilities
  • Critical Windows Notepad Flaw Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark