North Korea cybercriminals have executed a strategic pivot in their social engineering campaigns. They have stolen more than $300 million by impersonating trusted industry figures in fake video meetings.
The warning, detailed by MetaMask security researcher Taylor Monahan (known as Tayvano), outlines a sophisticated “long-con” targeting crypto executives.
How North Korea’s Fake Meetings Are Draining Crypto WalletsAccording to Monahan, the campaign departs from recent attacks that relied on AI deepfakes.
Instead, it uses a more straightforward approach built on hijacked Telegram accounts and looped footage from real interviews.