Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
    Cybersecurity

    BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures

    adminBy adminApril 29, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
    Share
    Facebook Twitter LinkedIn Pinterest Email

    North Korea’s BlueNoroff state-sponsored hacking group is targeting cryptocurrency executives in an audacious, financially motivated campaign that uses fake Zoom meetings populated with AI-generated avatars and stolen video footage of real people to trick victims into installing malware on their systems.

    What makes the campaign particularly insidious, according to a new report from Arctic Wolf, is how the threat actor steals webcam footage from each victim and then uses those videos to populate even more convincing fake Zoom meetings to target new victims. 

    Insidious Campaign

    Arctic Wolf found stolen images and videos of at least 100 individuals — nearly half of them CEOs or co-founders of their organizations — that the threat actor appears to have used as bait in the campaign. 

    Eight out of 10 of the identified victims operated either in the cryptocurrency/blockchain and associated finance sectors. “This concentration underscores BlueNoroff’s singular operational focus: individuals with access to cryptocurrency assets, wallet infrastructure, exchange platforms, or investment decision-making authority,” Arctic Labs said in a report this week.

    Related:Glasswing Secured the Code. The Rest of Your Stack Is Still on You

    One incident that Arctic Wolf investigated involved a senior executive at a US-based Web3 cryptocurrency company. The attack chain began with a BlueNoroff actor posing as the head of legal at an international consulting and law firm in the fintech and crypto sector, sending a Calendly invite to the target. The purported “catch-up” meeting was scheduled late last summer for five months in the future (January 2026). When the victim confirmed the meeting, a Google Meet calendar invite was generated, which the threat actor then covertly modified and replaced with a typo-squatted Zoom URL.

    “From the target’s perspective, the attack begins as a legitimate business interaction, often through a compromised Telegram account, Calendly invite, or calendar workflow impersonating a trusted contact such as a legal executive, VC partner, or industry peer,” says Ismael Valenzuela, VP of labs, threat research and intelligence at Arctic Wolf. “The pretext is a routine meeting.”

    When the victim in Arctic Wolf’s investigation clicked the link this past January, they were directed to a HTML page that convincingly mimicked a Zoom conference lobby, complete with fabricated participant avatars and pre-recorded clips mimicking a live meeting. When the victim granted microphone and camera access to join the fake meeting, the threat actor covertly began siphoning the webcam feed in real time, for use in future attacks.

    Related:Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia

    “[The victim sees] a realistic meeting interface populated with recognizable participants, which may include stolen webcam footage from prior victims, scraped images, or AI-generated headshots tailored to their network,” Valenzuela says. “The meeting appears active, with moving participant tiles and shifting speaker indicators, but there is no real conversation, and audio often appears not to function,” Valenzuela explains.

     

    bluenoroff-fig01a.png

    From Initial Click to Total Compromise in Minutes

    Seconds into the “meeting,” and seemingly to fix the errant audio issue, the victim received a ClickFix prompt about their Zoom SDK needing an update. When the victim acted on the prompt instructions it triggered a sequence of actions in the background that ended with multiple malicious payloads being installed on their systems, including those for persistence, command-and-control, credential harvesting, stealing from crypto currency wallets, and Telegram session theft. Arctic Wolf found the entire post-exploitation sequence, from initial click to full system compromise, including credential theft and persistent access, happening in less than five minutes. In the incident that the security vendor investigated, BlueNoroff maintained persistence on the victim environment for 66 days.

    Related:DPRK Fake Job Scams Self-Propagate in ‘Contagious Interview’

    One of the most alarming aspects of the campaign is how the attackers have established a “self-reinforcing deepfake production pipeline” that combined exfiltrated webcam footage from prior victims with AI-generated images to produce new fake meeting content, according to Arctic Wolf. The vendor analyzed more than 950 files from the attacker’s media hosting server, which showed the threat actor using three types of fake meeting participants in its campaign: stolen footage of prior victims, AI-generated still images, and deepfake composite videos that combined AI-generated faces with actual human body motion.

    “The attacker’s infrastructure is extensive and operationally active,” Arctic Wolf added. For example, BlueNoroff had more than 80 typo-squatted Zoom and Teams domains registered with just one hosting provider, with new ones being added on a continuous basis. “The volume of distinct payload delivery URLs observed on VirusTotal confirms this is not an isolated operation, but a sustained campaign targeting multiple organizations simultaneously,” the security vendor said.

    For organizations, the most important takeaway is that this is a coordinated social engineering campaign designed to scale through compromised identities, Valenzuela says. “Employees should verify meeting requests through a secondary channel, inspect calendar links for manipulation and avoid executing commands during a call,” he advises. “Security teams should restrict webcam and microphone access to trusted domains and monitor for clipboard abuse, PowerShell activity, and unauthorized access to browser-stored credentials.”

    Attack BlueNoroff calls Fake Lures turn victims zoom
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleResearchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
    Next Article Vimeo Confirms User and Customer Data Breach
    admin
    • Website

    Related Posts

    Broken VECT 2.0 ransomware acts as a data wiper for large files

    April 29, 2026

    Vimeo Confirms User and Customer Data Breach

    April 29, 2026

    Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

    April 28, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    OpenAI Crawl Activity Tripled Since GPT-5, Data Shows

    April 29, 2026

    Broken VECT 2.0 ransomware acts as a data wiper for large files

    April 29, 2026

    Track AI Answer Engine Rivals

    April 29, 2026

    Vimeo Confirms User and Customer Data Breach

    April 29, 2026
    Categories
    • Blogging (69)
    • Cybersecurity (1,566)
    • Privacy & Online Earning (187)
    • SEO & Digital Marketing (962)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (249)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    OpenAI Crawl Activity Tripled Since GPT-5, Data Shows

    April 29, 2026

    Broken VECT 2.0 ransomware acts as a data wiper for large files

    April 29, 2026

    Track AI Answer Engine Rivals

    April 29, 2026
    Most Popular
    • OpenAI Crawl Activity Tripled Since GPT-5, Data Shows
    • Broken VECT 2.0 ransomware acts as a data wiper for large files
    • Track AI Answer Engine Rivals
    • Vimeo Confirms User and Customer Data Breach
    • BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
    • Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
    • How To Benchmark Website Performance by Industry
    • FIDO Alliance wants to keep AI agents from going rogue on online payments
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.