Forums
Talk about anything you want!
Login to get your referral link.
Kenny Li, co-founder of Manta Network, revealed that he was the target of a very advanced phishing attempt involving Deepfake technology during a zoom call.
In a detailed article on April 17, Li described how attackers used pre -recorded videos of familiar individuals to usurp them in what seemed to be a legitimate meeting.
Li said that the video flow showed recognizable faces with activated cameras, adding to the illusion of authenticity.
However, he noticed that the audio was missing, and the participants prompted him to download a suspicious script file under the guise of a zoom update.
“I could see their legitimate faces. Everything looked very real. But I could not hear them … He asked me to download a script file. I am immediately left,” wrote Li on X.
He tried to confirm the identity of the caller via Telegram, but the person blocked him and deleted all messages shortly after.
Li suspects that the Lazarus group linked to North Korea was behind the incident. He also shared screenshots of the telegram conversation before she was erased.
A zoom link that has opened to Google Chrome on what looks like a zoom based on the web. Then, a notification appears by saying that your zoom is obsolete and that you must download a file to update it. General Mo with Lazarus is to find ways to have you download and open a file, so I am told.
–
Kenny.Manta (@Superanonymousk) April 18, 2025
Li warned the cryptographic community to process any unexpected download request – in particular updates or script files – like a major red flag.
“If you need to download something to continue talking to someone, do not do it,” he said, noting that such attacks exploit emotional familiarity and fatigue that is accompanied by constant communication in cryptographic space.
The attack was not isolated. A member of Contributiondao reported a similar experience, where the attackers insisted on using a personalized zoom customer and refused to go to Google Meet.
“Even if I zoom in on my computer, I couldn’t use it. They said it was a commercial version they had recorded,” they said.
Me too, boss, they also asked me to download Zoom via their link, and said it was only for their business. Even if I have a zoom on my computer, I couldn’t use it. They said it was a commercial version they had recorded. When I asked to go to …
– Vow | Contributiondao (@Vowimtx) April 18, 2025
Another user, crypto researcher “Meekdonald”, said that one of their friends had been the same ploy.
The coordinated nature of incidents suggests a wider phishing campaign targeting cryptography leaders using increasingly realistic DEFAKE methods to spread malware.
Last year, a detailed report from the Safety Blockchain Slowmist safety company revealed that an attack of sophisticated phishing disguised as a false zoom meeting link stole cryptographic assets worth millions.
The scam, identified for the first time on November 14, 2024, targets users by distributing malware via links that imitate the legitimate zoom interface.
In March, Kaito AI, a platform focused on artificial intelligence, providing an analysis of the cryptographic market, and its founder, Yu Hu, were targeted in a social media piracy on X.
The pirates took control of the account and falsely claimed that Kaito AI portfolios had been compromised, warning users that their funds were in danger.
The misleading positions, which have since been deleted, aimed to encourage panic among investors.
The co-founder of Post Manta Network targeted in a sophisticated zoom phishing attack using Deepfake videos appeared first on Cryptonews.
1
Voice
0
Replies