Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Manta Co-Founder ‘Targeted’ by Lazarus Group in Zoom Phishing Attempt

CN
Decrypt
Follow
11 months ago
AI summarizes in 5 seconds.

Armed with fake Zoom calls, stolen identities, and malware, North Korea’s Lazarus Group has allegedly expanded its crypto infiltration strategy, and the industry is starting to feel it.


Kenny Li, co-founder of Ethereum layer-2 project Manta Network, said he was “targeted” in an elaborate Zoom phishing attempt by Lazarus Group in a tweet Thursday.



A known contact of Li arranged a Zoom call where familiar faces appeared on camera, only no one spoke. Then a prompt appeared urging Li to download a script to fix his audio.


“I could see their legit faces. Everything looked very real,” he wrote on Thursday. “But I couldn’t hear them… it asked me to download a script file. I immediately left.”


To verify the contact, Li asked to continue the conversation on Google Meet instead. The impersonator refused, and moments later, all messages were erased, and Li was blocked.


“Lazarus social engineering is getting pretty good,” he added in a follow-up tweet, adding that the phishing attempt could have used either deepfakes or “recordings from previous calls where they infected/hacked the other people.”


Li noted that he was "not certain" the phishing attempt was the work of Lazarus Group, but that according to security researchers, it matched the hacking group's MO. Decrypt has reached out to Li, and will update this story should he respond.


North Korea’s phishing and hacking campaign


The incident is one of several recent attacks attributed to Lazarus, the North Korean state-backed hacking unit responsible for some of the largest crypto heists in history.


The group, already linked to February’s $1.4 billion Bybit hack, is reportedly changing its strategy by blending deepfake video, malware, and social engineering to deceive even experienced crypto executives.


According to new research from Paradigm security researcher Samczsun and Google’s Threat Intelligence Group (GTIG), Lazarus is just one arm of the DPRK’s sprawling cyber apparatus.


The regime now deploys a web of hacker subgroups like AppleJeus, APT38, and TraderTraitor, using tactics that range from fake job offers and Zoom calls to malware-laced npm packages and extortion.


Nick Bax of the Security Alliance (SEAL), a collective of white hat hackers and security researchers, issued a warning in March, “Having audio issues on your Zoom call? That’s not a VC, it’s North Korean hackers.”


He described the playbook in which chat messages cite audio issues, familiar faces appear on video, and the victim is redirected to download malware. “They exploit human psychology,” he wrote. “Once you install the patch, you’re rekt.”


Giulio Xiloyannis, co-founder of the Web3 platform for on-chain games and IPs MON Protocol, shared a similar experience. A hacker impersonating a project lead asked him to switch to a Zoom link mid-call.


“The moment I saw a Gumicryptos partner speaking and a Superstate one, I realized something was off,” he tweeted, sharing screenshots to warn others.


According to a recent GTIG report, North Korean IT workers are now infiltrating teams across the U.S., UK, Germany, and Serbia, masquerading as developers, using fake resumes and forged documents.


“DPRK hackers are an ever-growing threat against our industry,” Samczsun wrote, urging firms to adopt basic defenses, least privilege access, 2FA, device segregation, and to contact groups like SEAL 911 in the event of a breach.


免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

震荡行情滑点大?去Bybit体验极速现货撮合!
广告
|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by Decrypt

1 hour ago
Cambodia Extradites Alleged Huione Crypto Scam Kingpin to China: Report
2 hours ago
Bitcoin Gets Its First Bond Rating as Moody\\\'s Grades New Hampshire Deal
2 hours ago
Franklin Templeton to Buy CoinFund Spinoff, Build Out Crypto Investment Offering
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarcoindesk
14 minutes ago
Galaxy Digital\\\'s testnet suffers hack but no client funds or information were compromised
avatar
avatarbitcoin.com
53 minutes ago
Biggest IPO Ever? Elon Musk’s SpaceX Targets $1.75 Trillion in Public Offering
avatar
avatarDecrypt
1 hour ago
Cambodia Extradites Alleged Huione Crypto Scam Kingpin to China: Report
avatar
avatarcoindesk
1 hour ago
Crypto Long & Short: Governance is the real Layer 1
avatar
avatarbitcoin.com
1 hour ago
Bitcoin Whale Last Active in 2014 Executes Five-Transaction Move Totaling 500 BTC
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink