logo
Back to News
North Korea's Evolving Deepfake Tactics in Crypto Scams

North Korea's Evolving Deepfake Tactics in Crypto Scams

Cybersecurity

North Korea's Innovative Crypto Hacking Techniques

North Korean hackers are taking their crypto scams to new heights by incorporating deepfake technology and advanced social engineering. While they previously relied on fake job offers and investment pitches to spread malware, these tactics have now become more sophisticated. Instead of solely depending on victims interacting with infected files, hackers now employ recycled video calls and impersonations of Web3 executives to deceive targets.

North Korea: A Leader in Crypto Hacking

Already a significant threat globally, North Korean crypto hackers have evolved their infiltration techniques. Initially seeking employment within Web3 firms, these criminals have now expanded their strategy to include fake job offers as a means to disseminate malware.

Reports from Kaspersky, a digital security firm, indicate that North Korean hackers are utilizing new tools. BlueNoroff APT, a subset of the Lazarus Group, one of the most feared DPRK-based organizations, is conducting two active campaigns: GhostCall and GhostHire, both sharing the same management infrastructure.

Understanding the Novel Tactics

In the GhostCall campaign, hackers target Web3 executives by posing as potential investors. Meanwhile, GhostHire attracts blockchain engineers with alluring job offers. Both tactics have been operational since last month, with the threat level increasing. The scam's core remains unchanged: victims are tricked into downloading malware, be it a fake "coding challenge" or a cloned version of Zoom or Microsoft Teams.

Once victims engage with these compromised platforms, North Korean hackers can infiltrate their systems. Kaspersky highlights improvements such as targeting preferred operating systems of crypto developers. However, the scams' success still hinges on victims interacting with suspicious software.

Turning Failures into Opportunities

The enhanced coordination between GhostCall and GhostHire has allowed hackers to refine their social engineering techniques. Using AI-generated content, they exploit hacked accounts from real entrepreneurs or snippets of genuine video calls to bolster their credibility. This poses a significant threat, as a crypto executive might disengage from a suspicious recruiter, only for their likeness to be weaponized against new targets.

AI enables hackers to create convincing "conversations" that mimic a person's tone, gestures, and surroundings with startling realism. Even when these scams don't succeed, the potential damage remains significant. Individuals approached under unusual or high-pressure scenarios should remain cautious—avoiding unfamiliar software downloads and engagements that seem out of place.

Share this article