Connect with us

Crypto World

The Next Phase of Crypto Hacks May Start With a Video Call

Published

on

Crypto Attack Flow From Social Engineering to Multi-Stage Malware Deployment. Source: Google 

A North Korea–nexus threat actor is enhancing its social engineering playbook. The group is integrating AI-enabled lures into crypto-focused hacks, according to a new report from Google’s Mandiant team.

The operation reflects a continued evolution in state-linked cyber activity targeting the digital asset sector, which saw a notable increase in 2025.

Sponsored

Sponsored

Advertisement

Fake Zoom Call Triggers Malware Attack on Crypto Firm 

In its latest report, Mandiant detailed its investigation into an intrusion targeting a FinTech company in the cryptocurrency sector. The attack was attributed to UNC1069. It is a financially motivated threat group active since at least 2018, with links to North Korea.

“Mandiant has observed this threat actor evolve its tactics, techniques, and procedures (TTPs), tooling, and targeting. Since at least 2023, the group has shifted from spear-phishing techniques and traditional finance (TradFi) targeting towards the Web3 industry, such as centralized exchanges (CEX), software developers at financial institutions, high-technology companies, and individuals at venture capital funds,” the report read.

According to investigators, the intrusion began with a compromised Telegram account belonging to a crypto industry executive. The attackers used the hijacked profile to contact the victim. They gradually built trust before sending a Calendly invitation for a video meeting.

The meeting link directed the target to a fake Zoom domain hosted on infrastructure controlled by the threat actors. During the call, the victim reported seeing what appeared to be a deepfake video of a CEO from another cryptocurrency company. 

“While Mandiant was unable to recover forensic evidence to independently verify the use of AI models in this specific instance, the reported ruse is similar to a previously publicly reported incident with similar characteristics, where deepfakes were also allegedly used,” the report added.

The attackers created the impression of audio problems in the meeting to justify the next step. They instructed the victim to run troubleshooting commands on their device.

Advertisement

Sponsored

Sponsored

Those commands, tailored for both macOS and Windows systems, secretly initiated the infection chain. This led to the deployment of multiple malware components.

Crypto Attack Flow From Social Engineering to Multi-Stage Malware Deployment. Source: Google 
Crypto Attack Flow From Social Engineering to Multi-Stage Malware Deployment. Source: Google 

Mandiant identified seven distinct malware families deployed during the intrusion. The tools were designed to steal Keychain credentials, extract browser cookies and login data, access Telegram session information, and collect other sensitive files. 

Investigators assessed that the objective was twofold: to enable potential cryptocurrency theft and harvest data that could support future social engineering attacks.

Advertisement

The investigation revealed an unusually large volume of tooling dropped onto a single host. This suggested a highly targeted effort to harvest as much data as possible from the compromised individual.

The incident is part of a broader pattern rather than a standalone case. In December 2025, BeInCrypto reported that North Korean-linked actors siphoned more than $300 million by posing as trusted industry figures during fraudulent Zoom and Microsoft Teams meetings.

The scale of activity throughout the year was even more striking. In total, North Korean threat groups were responsible for $2.02 billion in stolen digital assets in 2025, a 51% increase from the previous year.

Chainalysis also revealed that scam clusters tied on-chain to AI service providers show significantly higher operational efficiency than those without such links. According to the firm, this trend suggests a future in which AI becomes a standard component of most scam operations.

Advertisement

With AI tools growing more accessible and advanced, creating convincing deepfakes is easier than ever. The coming time will test whether the crypto sector can adapt its security fast enough to confront these advanced threats.

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Judge Dismisses Bancor-Affiliated Patent Case Against Uniswap

Published

on

Law, Patents, United States, Bancor, DeFi, Uniswap, DEX

A New York federal judge dismissed a patent infringement lawsuit brought by Bancor-affiliated entities against Uniswap, ruling that the asserted patents claim abstract ideas and are not eligible for protection under US patent law.

In a memorandum opinion and order dated Tuesday, Feb. 10, Judge John G. Koeltl of the US District Court for the Southern District of New York granted the defendant’s motion to dismiss the complaint filed by Bprotocol Foundation and LocalCoin Ltd. against Universal Navigation Inc. and the Uniswap Foundation. 

The court found that the patents are directed to the abstract idea of calculating crypto exchange rates and therefore fail the two-step test for patent eligibility established by the US Supreme Court. 

The ruling marks a procedural win for Uniswap, but it is not final. The case was dismissed without prejudice, giving the plaintiffs 21 days to file an amended complaint. If no amended complaint is filed, the dismissal will convert to one with prejudice.

Advertisement

Shortly after the ruling, Uniswap founder Hayden Adams wrote on X, “A lawyer just told me we won.”

Law, Patents, United States, Bancor, DeFi, Uniswap, DEX
Source: Hayden Adams

Cointelegraph reached out to representatives of Bprotocol Foundation and Uniswap for comment but had not received a response by publication.

Judge finds that patents claim abstract ideas

As previously reported, Bancor alleged that Uniswap infringed patents related to a “constant product automated market maker” system underpinning decentralized exchanges.

The dispute centered on whether Uniswap’s protocol unlawfully used patented technology for automated token pricing and liquidity pools. 

Koeltl said that the patents were directed to “the abstract idea of calculating currency exchange rates to perform transactions.”

Advertisement

He wrote that currency exchange is a “fundamental economic practice” and that calculating pricing information is abstract under established Federal Circuit precedent.

The judge rejected arguments that implementing the pricing formula on blockchain infrastructure made the claims patentable, and said the patents merely use existing blockchain and smart contract technology “in predictable ways to address an economic problem.”

He said limiting an abstract idea to a particular technological environment does not make it patent-eligible. The court also found no “inventive concept” sufficient to transform the abstract idea into a patent-eligible application. 

Law, Patents, United States, Bancor, DeFi, Uniswap, DEX
Court grants motion to dismiss. Source: CourtListener

Related: Vitalik draws line between ‘real DeFi’ and centralized yield stablecoins

Complaint fails to plead infringement

Beyond patent eligibility, the court found that the amended complaint did not plausibly allege direct infringement.

Advertisement

According to the memorandum, the plaintiffs failed to identify how Uniswap’s publicly available code includes the required reserve ratio constant specified in the patents.

The judge also dismissed claims of induced and willful infringement, finding that the complaint did not plausibly allege that the defendants knew about the patents before the lawsuit was filed.

The dismissal without prejudice leaves open the possibility that Bprotocol Foundation and LocalCoin Ltd. could attempt to refile with revised claims.