Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
"Urgent Cybersecurity Notice": North Korean hackers impersonating Zoom to inject malware have stolen $300 million in cryptocurrency assets, your digital assets are at risk
Non-profit cybersecurity organization Security Alliance (SEAL) issues an urgent cybersecurity decree, revealing a hacker threat ravaging the crypto industry. North Korean hacker groups are extensively using fake Zoom video conferences to conduct poisoning attacks. Currently, multiple attempted cases are observed almost daily, making it the most severe cybersecurity crisis in the cryptocurrency industry. According to MetaMask security researcher Taylor Monahan’s investigation, hackers have stolen over $300 million worth of cryptocurrencies through this method.
How Fake Zoom Becomes a New Weapon for Hackers
Why do hackers choose Zoom as their primary attack vector? First, because Zoom video meetings are highly credible and widely used; second, because fake Zoom links are relatively easy to forge, and victims are least cautious during urgent calls. Hackers first send messages on Telegram impersonating the victim’s “trusted contacts.” Since the account belongs to someone the victim knows or has interacted with, their guard naturally drops. The conversation is then cleverly guided toward an invitation to “find time to chat on Zoom.”
During this process, hackers send a seemingly normal link before the video call. Victims clicking the link can even see the other person, along with their partners or colleagues. The key here is that hackers do not use “deepfake” video technology but instead utilize real clips obtained from previously stolen recordings or from public sources (such as podcasts). The use of authentic segments further significantly enhances the credibility of the video.
Layered Poisoning Trap: Complete Attack Process Analysis
The real attack occurs after the Zoom meeting begins. Hackers intentionally create the illusion of audio or connection issues, then send a so-called “patch file,” claiming it can immediately resolve the technical problem. Once the victim clicks and opens this file, malicious software silently infiltrates the device.
Crucially, at this point, hackers do not act immediately. Instead, they make an excuse to reschedule and end the call casually. Taylor Monahan warns: “Unfortunately, your computer has already been compromised. They are just pretending to be calm to avoid detection. Ultimately, they will steal all your cryptocurrencies, your passwords, confidential data of your company or protocol, and your Telegram account. Then, you become the next person to ‘harm’ your friends.”
This covert threat is especially dangerous because victims are unaware during the attack. Hackers can take their time to perform deeper information theft and asset transfers.
Emergency Defensive Decree After Being Hacked: 5 Key Actions
Anyone who clicks on suspicious links shared during a Zoom call must immediately take the following critical actions, as time is extremely tight:
Immediately Isolate the Infected Device:
Rescue Crypto Assets:
Reset All Passwords and Authentication:
Perform Deep Cleaning:
Protect Your Telegram Account: Block Hacker Extension Attacks
Taylor Monahan emphasizes that protecting your Telegram account is crucial. Once hackers control your Telegram account, they can access all stored contact information, which becomes a valuable list for finding the next victims. Protective steps include:
The core of this defensive decree is to cut off all traces of hacker activity on your Telegram account, preventing you from becoming the next “helper” spreading viruses to friends.
North Korean hackers continue to evolve their fake Zoom poisoning tactics. Every delay in defense could result in millions of assets vanishing instantly. Immediately executing this protective decree is your last line of defense to safeguard your crypto assets.