North Korean hackers have stolen over $300 million by faking Zoom meetings to spread malware.

This article is machine translated
Show original

PANews reported on December 15th that, according to Cointelegraph, cybersecurity firm Security Alliance (SEAL) stated that North Korean hackers are using fake Zoom meetings to trick victims into downloading patch files that implant malware, stealing passwords and private keys. Taylor Monahan warned that this method has already caused over $300 million in losses. The modus operandi includes: directing traffic from familiar Telegram accounts → disguising meeting links and recorded videos → sending patches during the meeting under the pretext of audio malfunctions → continuing intrusion after ending the call. If you have already clicked the link, it is recommended to immediately disconnect from the internet and shut down your device, transfer your encrypted assets to a new wallet using another device, change all passwords and enable two-factor authentication, and perform a full cleanup of the infected device; simultaneously, terminate other Telegram conversations, change your password and enable multi-factor authentication, and inform your contacts as soon as possible to prevent further spread.

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments