Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Just caught wind of something pretty alarming in the crypto security space. Google Cloud's Mandiant team just flagged a North Korea-linked cyber operation that's been quietly targeting crypto and fintech companies with some seriously sophisticated tactics.
What caught my attention is how coordinated this whole thing is. We're talking about a threat group they're calling UNC1069 that's been scaling up operations since 2018, and now they've identified seven different malware families being deployed simultaneously. That's not random—this is clearly well-resourced and deliberate.
The technical side is what's really concerning. Two newly discovered malware strains, CHROMEPUSH and DEEPBREATH, are specifically engineered to slip past OS security features and grab sensitive data. They're not just throwing generic tools at this—these are purpose-built weapons. And there's also SILENCELIFT in the mix, part of a broader toolkit designed to harvest and exfiltrate whatever data they can get their hands on.
But here's where it gets creepy. They're not relying purely on technical exploits. Mandiant's report details how they're compromising Telegram accounts and setting up fake Zoom meetings with AI-generated deepfake videos. Once they get you on the call, they trick you into executing hidden commands through what's called ClickFix attacks. It's social engineering on steroids—combining AI-generated content with social manipulation.
The North Korea-flagged operation is clearly targeting the crypto and fintech sector specifically, which makes sense given the geopolitical tension and the potential financial payoff. If you're working in this space, this is worth taking seriously. Tighten your security protocols, be skeptical of unsolicited video calls, and definitely don't trust random links or commands from unverified sources.
This kind of coordinated campaign shows just how much state-level actors are focusing on the crypto industry. Definitely something to keep an eye on.