SEAL Security Alliance said it now tracks multiple daily attempts tied to the North Korean fake Zoom scam.
The fake Zoom crypto hack uses a meeting invite that looks normal. Then it shifts to a file download that installs malware.
Security researcher Taylor Monahan said the method has already stolen more than $300 million. The warning circulated with material credited to SEAL Security Alliance.
North Korean Fake Zoom Scam. Source: Taylor Monahan via X
The North Korean fake Zoom scam often begins on Telegram. Monahan said the first message can come from an account the target recognizes.
The chat then moves into a Zoom plan. Monahan said attackers push a link that looks real. She said the link is “usually masked to look real.”
“They’ll share a link before the call that is usually masked to look real,”
Monahan said. She added that victims can see “the person + some of their partners colleagues” during the call.
Monahan also addressed claims about AI video.
More Info