How North Korean Hackers Use Fake Video Calls to Steal $300 Million in Crypto

Published 12/14/2025

How North Korean Hackers Use Fake Video Calls to Steal $300 Million in Crypto

How North Korean Hackers Use Fake Video Calls to Steal $300 Million in Crypto

North Korean hackers have tricked people into fake video calls to steal more than $300 million in cryptocurrency. They pretend to be trusted contacts and use recorded videos to gain access to victims’ digital wallets.

What happened

According to multiple cybersecurity sources, North Korean hackers linked to the Lazarus Group have stolen approximately $300 million in cryptocurrency through a novel social engineering tactic involving fake video calls. These attackers impersonated employees or partners of legitimate cryptocurrency exchanges during Zoom meetings, thereby gaining victims’ trust and extracting sensitive information such as private keys and account credentials. This method marks an evolution from traditional phishing or email scams toward leveraging real-time or pre-recorded video interactions to bypass conventional security assumptions.

The use of video conferencing platforms like Zoom as a vector for these attacks represents a strategic adaptation by state-sponsored cybercriminals. The attackers exploited the inherent trust users place in face-to-face video communication, which is often seen as more secure and authentic than emails or phone calls. This trust allowed them to overcome typical security barriers, especially in environments where multi-factor authentication or robust operational security protocols were insufficient or improperly implemented.

Cybersecurity firms such as Recorded Future and Chainalysis have attributed these attacks to the Lazarus Group, a North Korean state-sponsored hacking entity known for targeting cryptocurrency platforms and financial institutions worldwide. The group’s adoption of video call impersonation reflects a hybrid approach to cybercrime, combining psychological manipulation with emerging communication technologies to enhance the effectiveness of their intrusions.

Why this matters

This development highlights a significant shift in the threat landscape for digital asset security. The integration of social engineering with emerging communication tools like Zoom exposes vulnerabilities that extend beyond purely technical defenses. It underscores the limitations of traditional security measures that rely heavily on digital authentication methods without accounting for human factors such as trust in video interactions.

From a market perspective, the theft of $300 million in cryptocurrency through these means raises concerns about the resilience of crypto exchanges and wallet providers against increasingly sophisticated attacks. The hybrid nature of these scams—combining psychological tactics with technology—demands a reevaluation of verification processes. Experts emphasize the need for enhanced security protocols that go beyond face-to-face video confirmation, such as cryptographic authentication or out-of-band verification, to better protect digital assets.

On a broader policy level, this case illustrates how state-sponsored cybercrime is evolving to weaponize emerging communication platforms, complicating efforts to safeguard financial infrastructure. It also poses challenges for regulators and platform providers, who must consider how to detect and prevent abuse of widely used communication tools without infringing on legitimate use.

What remains unclear

Despite the available information, several key aspects of these attacks remain unresolved. The precise technical methods used to create the fake video calls—whether deepfakes, pre-recorded clips, or real-time impersonation—have not been fully disclosed or verified. Details on how victims verified the callers’ identities and which specific operational security failures allowed the attackers to succeed are not publicly documented.

The extent to which this tactic is widespread versus limited to a handful of high-profile incidents has not been quantified. Additionally, the role of video conferencing platform providers such as Zoom in detecting or mitigating such abuses is not extensively discussed in the available sources. Finally, the degree of coordination between North Korean state apparatus and the Lazarus Group in developing these social engineering techniques remains unclear.

There are also no official disclosures or forensic reports from affected exchanges or victims that provide a detailed breakdown of the internal security breaches or the step-by-step sequence of these attacks. This limits the ability to fully assess the technical and procedural vulnerabilities exploited.

What to watch next

  • Potential disclosures or security advisories from cryptocurrency exchanges regarding the scope and nature of these fake video call attacks.
  • Regulatory responses addressing the security risks posed by social engineering tactics leveraging emerging communication platforms.
  • Developments in verification protocols for digital asset management, including adoption of cryptographic authentication or multi-channel confirmation beyond video calls.
  • Research or technical reports clarifying the methods used to fabricate or simulate the fake video calls (e.g., deepfake technology or other impersonation techniques).
  • Actions or statements from video conferencing platform providers concerning detection and prevention of identity spoofing or fraudulent use of their services in cybercrime.

The use of fake video calls by North Korean hackers to steal cryptocurrency illustrates an evolving cyber threat that merges social engineering with new communication technologies. While the confirmed losses and attribution to the Lazarus Group are clear, critical details about the technical execution and broader prevalence remain undisclosed. This case underscores the growing complexity of securing digital assets in an environment where trust in video communication can be exploited, highlighting the need for enhanced security measures and transparency from all stakeholders.

Source: https://beincrypto.com/north-korea-crypto-theft-via-zoom-meetings/. This article is based on verified research material available at the time of writing. Where information is limited or unavailable, this is stated explicitly.