CyberSecurity SEE

North Korean Hackers Target Crypto Firms Using ClickFix and Zoom Tactics

North Korean Hackers Target Crypto Firms Using ClickFix and Zoom Tactics

A recently released report from Arctic Wolf has unveiled a significant cyber theft campaign orchestrated by hackers linked to the notorious Lazarus Group from North Korea. This extensive operation has targeted more than 100 cryptocurrency organizations across over 20 countries, highlighting the pervasive threat posed by advanced persistent threat (APT) groups.

The spear-phishing campaign utilized a variety of social engineering techniques designed to exploit human vulnerabilities. Among these tactics were impersonations of notable figures in the fintech industry, as well as the creation of typographical variations on popular communication platforms like Zoom and Microsoft Teams. Attackers sent out manipulated Calendly calendar invites, luring victims further into their traps. A particularly insidious method involved employing ClickFix-style clipboard injection attacks, which covertly harvested sensitive information from unsuspecting users.

In a detailed analysis published on April 27, Arctic Wolf Labs researchers confidently attributed the campaign to BlueNoroff, a subgroup within the larger Lazarus Group. This subgroup has been known for its sophistication and relentless focus on financial cybercrime, making it a formidable presence in the cyber landscape.

### Spear-Phishing Mechanics and Initial Detection

Arctic Wolf began tracking the hackers’ activities after identifying an intrusion at a North American cryptocurrency firm on January 23, 2026. The detailed telemetry data from the victim’s internal systems revealed a complex multi-stage execution chain initiated by a typosquatted Zoom meeting link, which was delivered through a carefully crafted Calendly invite.

Upon clicking the link, the target was presented with a fake Zoom interface that not only exfiltrated the victim’s live camera feed but simultaneously initiated a ClickFix-style clipboard injection attack. This attack served as a step in a multi-faceted credential extraction pipeline, targeting sensitive information stored on the victim’s device and focusing specifically on cryptocurrency wallet extensions. According to Arctic Wolf’s report, this initial attack commenced approximately five months after the hackers first established contact with their primary victim. Remarkably, the overall execution process—from the first click to complete system compromise—took less than five minutes, with the threat actor maintaining access to the affected systems for an astonishing 66 days.

### A Global Spear-Phishing Campaign

Researchers from Arctic Wolf found that their investigation uncovered 100 additional targets compromised by the attackers, revealing a sophisticated infrastructure supporting this extensive operation. The geographical distribution of these victims demonstrated the global reach of the campaign, with a concentration in the United States (41%), followed by notable numbers from Singapore (11%) and the United Kingdom (7%). Notably, a significant percentage (80%) of the compromised organizations were involved in the cryptocurrency, blockchain finance, or adjacent sectors, with a striking 45% of the targeted individuals being CEOs or founders.

As the investigation progressed, researchers identified over 80 typosquatted domains related to Zoom and Microsoft Teams registered between late 2025 and March 2026, all operating within the same infrastructure. Furthermore, the group’s media server hosted an impressive collection of more than 950 files, showcasing “a self-sustaining deepfake pipeline.” This sophisticated mechanism allowed the exfiltrated webcam footage from victims to be merged with AI-generated images, all aimed at creating convincing fake meeting content.

Moreover, Arctic Wolf discovered evidence of advanced tools, including a PowerShell-based command-and-control (C2) implant and an AES-encrypted browser injection payload, as well as mechanisms designed for exfiltrating screenshots via the Telegram Bot API.

### BlueNoroff: The Financial Arm of Lazarus

Experts agree that BlueNoroff, which has been active since at least 2014, functions as the financial cybercrime arm of the Lazarus Group. Arctic Wolf’s findings were consistent with earlier discussions by cybersecurity firms like Kaspersky and Huntress, which suggested that BlueNoroff is behind a series of targeted campaigns aimed at extracting revenue through cryptocurrency theft.

The group’s notoriety surged during the infamous 2016 Bangladesh Bank heist, where it attempted to steal a staggering $951 million and successfully transferred $81 million. Since then, BlueNoroff has shifted its focus toward the cryptocurrency sector, continuing its SnatchCrypto operation that has been active since at least 2017.

This recent revelation serves as a stark reminder of the sophisticated cyber threats confronting the cryptocurrency industry. As cybercriminals become increasingly adept at using advanced social engineering techniques, organizations must ramp up their defenses and remain ever vigilant against these evolving threats.

Source link

Exit mobile version