Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The Rundown: Why YouTube has become key for brand GEO strategies

    Brands celebrate tariff reprieve, but fresh uncertainty looms

    In Graphic Detail: Publishers chase video podcast growth, but audio still leads

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026
    • Business

      How Smarsh built an AI front door for regulated industries — and drove 59% self-service adoption

      February 24, 2026

      Where MENA CIOs draw the line on AI sovereignty

      February 24, 2026

      Ex-President’s shift away from Xbox consoles to cloud gaming reportedly caused friction

      February 24, 2026

      Gartner: Why neoclouds are the future of GPU-as-a-Service

      February 21, 2026

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026
    • Crypto

      BitMine Buys $93 Million in ETH, but Ethereum Slides as Holders Resume Selling

      February 24, 2026

      XRP Ledger Sets Multiple Key Records in February Despite Price Decline

      February 24, 2026

      Bhutan Rolls Out Solana-Backed Visas Even As Demand Stays Weak

      February 24, 2026

      ZachXBT Teases Major Crypto Exposé Ahead of Feb. 26 — How Is Smart Money Positioned?

      February 24, 2026

      Acurast turns 225,000 smartphones into a secure AI network on Base

      February 24, 2026
    • Technology

      The Rundown: Why YouTube has become key for brand GEO strategies

      February 25, 2026

      Brands celebrate tariff reprieve, but fresh uncertainty looms

      February 25, 2026

      In Graphic Detail: Publishers chase video podcast growth, but audio still leads

      February 25, 2026

      Future of TV Briefing: Netflix’s in-house ad platform launch has led some advertisers to double spend

      February 25, 2026

      Can agencies fix the AI disconnect between the C-suite and marketing teams? Boathouse is trying to

      February 25, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»North Korean hackers deepfake execs in Zoom call to spread Mac malware
    Technology

    North Korean hackers deepfake execs in Zoom call to spread Mac malware

    TechAiVerseBy TechAiVerseJune 19, 2025No Comments4 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    North Korean hackers deepfake execs in Zoom call to spread Mac malware
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    North Korean hackers deepfake execs in Zoom call to spread Mac malware

    The North Korean BlueNoroff hacking group is deepfaking company executives during Zoom calls to trick employees into installing custom malware on their macOS devices.

    BlueNoroff (aka Sapphire Sleet or TA444) is a North Korean advanced persistent threat (APT) group known for conducting cryptocurrency theft attacks using Windows and Mac malware.

    Huntress researchers uncovered a new BlueNoroff attack on June 11, 2025, when they were called to investigate a potential intrusion on a partner’s network.

    Like previous attacks, the primary goal was most likely cryptocurrency theft, which aligns with other recent reports about the threat actors from SentinelLabs, Microsoft, Jamf, and Kaspersky.

    Zoom attacks

    The target, an employee at a tech firm, was contacted by the attackers on Telegram, who posed as external professionals requesting a meeting.

    The attacker sent a message containing a Calendly link for what appeared to be a Google Meet session, but the invite link was actually a fake Zoom domain controlled by the attackers.

    This tactic is similar to a campaign discovered by Trail of Bits in April, who attributed it to the North Korean activity cluster ‘Elusive Comet.’

    When the employee attended the meeting, which was actually a Zoom meeting, it included deepfake videos of recognizable senior leadership from the employee’s company and various external participants to add credibility.

    During the meeting, the victim encountered issues with their microphone, which didn’t work, seemingly due to technical problems. The deepfakes advised the victim to download a supposed Zoom extension that would fix the problem.

    The link provided via Telegram led the victim to download an AppleScript file (zoom_sdk_support.scpt).

    Malicious AppleScript script sent as a fix for microphone issues
    Source: Huntress

    Upon execution, the file opens a legitimate Zoom SDK webpage, but after parsing 10,500 blank lines, it executes a malicious command that downloads a secondary payload from an external source (https[://]support[.]us05webzoom[.]biz) and executes it.

    By the time Huntress was called to investigate, the final payload had been pulled from the attacker-controlled domain. However, they were able to find a version on VirusTotal that provided some insight.

    “The script begins by disabling bash history logging and then checks if Rosetta 2, which allows Apple Silicon Macs to run x86_64 binaries, is installed,” explains Huntress’ report.

    “If it isn’t, it silently installs it to ensurex86_64 payloads can run. It then creates a file called .pwd, which is hidden from the user’s view due to the period prepending it and downloads the payload from the malicious, fake Zoom page to /tmp/icloud_helper.”

    Overall, the reseachers found eight distinct malicious binaries on the host compromised in this attack.

    Excluding minor tools used in process injection and implant decryption, the Mac malware used in the campaign were:

    • Telegram 2 – Nim-based persistence implant disguised as a legitimate Telegram updater. It runs on a schedule and acts as the entry point for the rest of the malware chain. The binary is signed with a valid Telegram developer certificate, helping it evade scrutiny and remain undetected.
    • Root Troy V4 – Go-based backdoor that enables remote code execution, command queuing during sleep states, and downloading of additional payloads. It serves as the central controller for post-infection operations and maintains the malware’s configuration and state.
    • a (InjectWithDyld) – A second-stage loader that decrypts encrypted implants using a password-derived AES key and injects them into memory. It uses macOS-specific APIs for process injection and includes antiforensic functionality to wipe traces of itself after use.
    • XScreen (keyboardd) – Surveillance component that logs keystrokes, records the screen, and monitors the clipboard. It operates continuously in the background and sends collected data to a command-and-control server.
    • CryptoBot (airmond) – Cryptocurrency-focused infostealer written in Go. It targets over 20 wallet platforms, extracting sensitive data and storing it in a local encrypted cache for exfiltration.

    The intrusion discovered by Huntress reflects the growing sophistication of BlueNoroff, who now leverages AI deepfakes for social engineering and custom macOS malware.

    Huntress warns that many Mac users have been lulled into thinking they’re less likely to be targeted by malware.

    However, as macOS gains broader adoption in the enterprise, threat actors increasingly develop malware that targets the operating system.

    Recent campaigns, ranging from widespread infostealers and drainers aimed at crypto theft to advanced, targeted attacks on organizations like this, make it clear that macOS users must be better prepared and protected.

    Why IT teams are ditching manual patch management

    Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

    In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleMicrosoft 365 to block file access via legacy auth protocols by default
    Next Article Pro-Israel hackers hit Iran’s Nobitex exchange, burn $90M in crypto
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    The Rundown: Why YouTube has become key for brand GEO strategies

    February 25, 2026

    Brands celebrate tariff reprieve, but fresh uncertainty looms

    February 25, 2026

    In Graphic Detail: Publishers chase video podcast growth, but audio still leads

    February 25, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025692 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025279 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025160 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025122 Views
    Don't Miss
    Technology February 25, 2026

    The Rundown: Why YouTube has become key for brand GEO strategies

    The Rundown: Why YouTube has become key for brand GEO strategies By Sam Bradley  • …

    Brands celebrate tariff reprieve, but fresh uncertainty looms

    In Graphic Detail: Publishers chase video podcast growth, but audio still leads

    Future of TV Briefing: Netflix’s in-house ad platform launch has led some advertisers to double spend

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The Rundown: Why YouTube has become key for brand GEO strategies

    February 25, 20262 Views

    Brands celebrate tariff reprieve, but fresh uncertainty looms

    February 25, 20261 Views

    In Graphic Detail: Publishers chase video podcast growth, but audio still leads

    February 25, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.