Skip to content

AI-enhanced North Korean cyber campaign targets crypto and fintech firms

Google Cloud flags North Korea-linked crypto malware campaign
SHARE THIS ARTICLE

Mandiant, which is part of Google Cloud, has been following the suspected North Korean fraudsters since 2018. But since November 2025, AI has made it easier for them to launch more attacks.

Threat actors linked to North Korea are ramping up social engineering attacks against cryptocurrency and fintech organisations by using new malware that is meant to steal sensitive data and digital assets.

According to a report from Mandiant, a US cybersecurity company that works for Google Cloud, a threat group known as UNC1069 used seven types of malware in a recent campaign to steal and exfiltrate victim data.

AI-enhanced North Korean cyber campaign targets crypto and fintech firms

Source: Mandiant/Google Cloud

New malware families deployed in targeted intrusions

The campaign included social engineering tactics that involved hacked Telegram accounts and bogus Zoom meetings with deepfake videos made by AI tools.

The study says, “This investigation revealed a tailored intrusion resulting in the deployment of seven unique malware families, including a new set of tools designed to capture host and victim data: SILENCELIFT, DEEPBREATH, and CHROMEPUSH.”

Mandiant says that the group’s activities have grown, and they are now mostly going after crypto startups, software engineers, and venture capital firms.

The malware had two new, advanced data-mining viruses called CHROMEPUSH and DEEPBREATH. They are made to get around important parts of the operating system and get to personal data.

Mandiant has been keeping an eye on the threat actor with “suspected” North Korean ties since 2018. However, thanks to advances in AI, the bad actor was able to grow its operations and include “AI-enabled lures in active operations” for the first time in November 2025, according to a report from the Google Threat Intelligence Group at the time.

ClickFix technique used to compromise crypto founders

According to Mandiant, attackers exploited a hacked Telegram account belonging to a crypto entrepreneur to start a conversation in one case. The attacker invited the victim to a Zoom conference where they pretended to be having trouble with the audio.

In a ClickFix attack, the attacker told the victim to run troubleshooting commands on their machine to remedy the fake audio problem.

Mandiant said that the troubleshooting commands included a secret single instruction that started the infection chain.

People who are connected to North Korea have been a constant threat to both crypto investors and Web3-native businesses.

The Lazarus Group was connected to the $1.4 billion hack of Bybit, which was one of the biggest crypto thefts ever, earlier that year.

Coin Headlines covers the latest news in crypto, blockchain, Web3, and markets, bringing you credible and up-to-date information on all the latest developments from around the world.

We focus on real-time news updates, market movements, whale transfers, and macroeconomic trends to keep you informed and engaged. Whether it’s Bitcoin price swings, altcoin updates, meme coin hype, regulatory changes, or major moves from the world of traditional finance, Coin Headlines gives you what you need to know, right when you need it.