Deepfake Zoom Scams Hit Crypto Insiders as BTC Prague Co-Founder Warns of Mac Malware

BTC-0,16%

Key Takeaways:

  • Crypto insiders are being targeted by deepfake video calls that deliver macOS malware
  • BTC Prague co-founder Martin Kuchař says his stolen Telegram account was used to spread the attack
  • The campaign matches tactics tied to North Korea–linked BlueNoroff hackers

A crypto scam wave with a highly-targeted level is exploiting deepfake video, relationship contacts and popular work tools. BTC Prague co-founder, Martin Kuchař disclosed that attackers controlled his Telegram account to lure others into Zoom and Teams video call with malware.

Read More: $50M Vanishes in Seconds: Copy-Paste Wallet Error Triggers One of Crypto’s Costliest Address Scams

Table of Contents

  • Deepfake Video Calls Used as the Entry Point
  • North Korea–Linked Malware Chain Targets Mac Users
    • How the Mac Infection Works
    • Crypto Theft Campaigns Grow More Sophisticated

Deepfake Video Calls Used as the Entry Point

Kuchař warned that the attacks often start with messages from trusted contacts on Telegram or other platforms. The victims receive an invitation to discuss the matter or also have a quick sync in a Zoom or Microsoft Teams call.

After getting the call, the attackers impersonate the trusted person through AI-generated deepfake video. They state that there is an audio problem and request the victim to install a given plug in or file so as to resolve the issue. That file gives attackers full access to the system.

According to Kuchař, this method led to the theft of Bitcoin, takeover of Telegram accounts, and further spread of the scam through hijacked identities. He urged users to treat all Telegram messages as untrusted and to avoid unverified Zoom or Teams calls.

Read More: Hackers Hijack Binance Co-CEO Yi He’s WeChat to Push Meme Coin Scam, Triggering Market Frenzy

North Korea–Linked Malware Chain Targets Mac Users

Technical details shared by Kuchař align with research from cybersecurity firm Huntress, which traced similar attacks to BlueNoroff, a hacking group linked to North Korea’s Lazarus Group.

How the Mac Infection Works

The attack starts with a spoofed Zoom domain with a faked meeting link. When victims are making the call, they are advised to download a file named Zoom support script. Actually, the file is infected by AppleScript, which starts a multi-stage attack.

The malware toolkit will consist of:

  • Telegram 2, a fake updater that maintains persistence
  • Root Troy V4, a remote-access backdoor
  • InjectWithDyld, a stealth loader for encrypted payloads
  • XScreen, a surveillance tool that logs keystrokes and screen activity
  • CryptoBot, an infostealer targeting more than 20 crypto wallets

Researchers indicate that the malware will leverage valid developer signatures and place Rosetta on Apple Silicon devices in order to evade identification. This renders the attack less detectable, particularly to the Mac users who have a false sense of security that their respective systems are less vulnerable.

Crypto Theft Campaigns Grow More Sophisticated

Huntress researchers point out that Mac is an excellent target because an increasing number of crypto groups deploy Macs to the enterprise. Deepfake video injects strongly in the credibility equation, combining real-time images with the known platform.

Basic security habits revealed by Kuchař assisted in curtailing his losses. He emphasized the use of two-factor authentication, password solution, and hardware wallets. He also recommended more secure communication tools, such as Signal or Jitsi, and better browsers over more secure calls, such as Google Meet due to greater sandboxing.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Bitcoin Mining Weekly Digest: TeraWulf Completes $1.035B Equity Offering

Gate News message, April 24 — During the week of April 11-17, 2026, Bitcoin's network-wide average hash rate stood at 935 EH/s, down 4.43% from the previous week's 978.9 EH/s, with peaks reaching 1,064 EH/s and lows of 815 EH/s. Bitcoin's average price was $76,048.3, up 3.9% from the prior week's $6

GateNews4m ago

ARK Invest's Bitcoin 'Conviction Buyers' Holdings Surge 69% in Q1, Hitting Highest Level Since 2020

Gate News message, April 24 — ARK Invest reported that its "Conviction Buyers" bitcoin holdings surged from 2.13 million BTC to 3.6 million BTC in the first quarter of 2026, an increase of 69% and the highest level since 2020. The growth occurred despite bitcoin's price declining 22% during the

GateNews55m ago

Largest Bank in Brazil Moves to Invest in Bitcoin Mining

Itau Unibanco, through its VC arm Itau Ventures, has made an undisclosed investment in Minter, a company that installs mobile data centers and bitcoin mining operations across Brazil. Minter’s approach allows it to take advantage of surplus energy that would otherwise be wasted. Key Takeaways: It

Coinpedia1h ago

Bitcoin ETFs Record $335.8M Inflows as Rolling Flows Turn Positive

US spot Bitcoin ETFs recorded US$335.8 million in net inflows on April 22, according to Farside Investors data, marking a return to positive territory across every major rolling period. BlackRock's IBIT led the session with US$246.9 million in inflows, signaling renewed institutional demand for regu

CryptoFrontier1h ago

US Government Operating Bitcoin Node Without Mining, Admiral Indicates

A senior admiral has indicated that the US Government is actively operating a node on the Bitcoin network while deliberately avoiding participation in mining activities. The disclosure suggests that authorities are taking a more involved role in blockchain infrastructure for oversight and

CryptoFrontier2h ago
Comment
0/400
No comments