PANews reported on March 13 that according to Cointelegraph, in the past few days, at least three founders of encryption projects reported that they had successfully thwarted suspected North Korean hackers' attempts to steal sensitive data through fake Zoom calls. On March 11, Nick Bax, a member of the white hat hacker group "Security Alliance", posted a warning on the X platform that North Korean scammers have used this method to steal millions of dollars from victims. Bax introduced that scammers usually contact targets with meetings or cooperation as bait. After the call starts, they will send a message pretending that there is a problem with the audio, while playing a boring video of venture capitalists, and then provide a fake new call link, claiming that a patch needs to be installed to fix the audio/video. Taking advantage of people's eagerness to meet with important people and fix the audio, the target is induced to relax his vigilance. Once the patch is installed, it will be hit.
Giulio Xiloyonnis, co-founder of blockchain game Mon Protocol, said scammers tried to trick him and his marketing director with a collaboration meeting. Fortunately, he realized at the last minute that the Zoom link provided was a scam, claiming that the audio could not be read, and induced the installation of malware. David Zhang, co-founder of US venture capital-backed stablecoin Stably, was also one of the targets. The scammers used his Google Meet link, but then made up the excuse of an internal meeting and asked him to join. Zhang said the website looked like a normal Zoom call, but he answered it on a tablet and was not sure how it would behave on a desktop. Melbin Thomas, founder of Devdock AI, a decentralized artificial intelligence platform for Web3 projects, also fell victim to the scam and is not sure whether the technology is still at risk. Thomas said that although he did not enter a password during the installation process, he had disconnected the laptop and reset it to factory settings. He only transferred the files to the hard drive and had not reconnected it yet, so he did not know whether the hard drive was infected.
In addition, earlier today, blockchain security company CertiK said that after a series of high-profile hacking attacks, it was discovered that the Lazarus Group was using mixers to transfer crypto assets, and it had detected 400 Ethereum deposited into the Tornado Cash mixing service, worth about $750,000.

