Cryptocurrency Sector Targeted with New Tooling and AI-Enabled Social Engineering
North Korean threat actor UNC1069 has evolved its tactics to target the cryptocurrency and decentralized finance sectors. In a recent intrusion, they deployed seven unique malware families, including new tools SILENCELIFT, DEEPBREATH, and CHROMEPUSH, designed to capture host and victim data. The attack utilized social engineering involving a compromised Telegram account, fake Zoom meeting, and reported AI-generated video. UNC1069 has shifted from spear-phishing to targeting Web3 industry entities like centralized exchanges, software developers, and venture capital firms. The intrusion demonstrated sophisticated techniques to bypass macOS security features and harvest credentials, browser data, and cryptocurrency information. This marks a significant expansion in UNC1069's capabilities and highlights their focus on financial theft and fueling future social engineering campaigns.
AI Analysis
Technical Summary
UNC1069, a North Korean state-sponsored threat actor, has escalated its cyber operations by targeting the cryptocurrency and decentralized finance (DeFi) sectors with a sophisticated campaign deploying seven unique malware families, including newly identified tools SILENCELIFT, DEEPBREATH, and CHROMEPUSH. These malware families are engineered to evade macOS security mechanisms and focus on harvesting host system data, victim credentials, browser data, and cryptocurrency wallet information. The campaign employs advanced social engineering techniques enhanced by AI, such as leveraging compromised Telegram accounts, staging fake Zoom meetings, and using AI-generated deepfake videos to deceive victims. This represents a tactical shift from traditional spear-phishing to direct targeting of Web3 industry stakeholders, including centralized cryptocurrency exchanges, software developers, and venture capital firms involved in blockchain investments. The malware families incorporate various tactics aligned with MITRE ATT&CK techniques such as process injection (T1055.001), credential dumping (T1005), and user execution (T1204), indicating a multi-faceted approach to infiltration and data exfiltration. The campaign's sophistication and focus on financial theft underscore UNC1069's intent to monetize stolen data and credentials, potentially enabling further social engineering campaigns and financial fraud. Although no known public exploits are reported, the campaign's complexity and use of AI-enhanced deception elevate the threat profile significantly.
Potential Impact
For European organizations, particularly those involved in cryptocurrency trading, blockchain development, and venture capital investments in Web3 technologies, this threat poses substantial risks. Successful intrusions can lead to the theft of sensitive credentials, browser data, and cryptocurrency assets, resulting in direct financial losses and reputational damage. The use of AI-enabled social engineering increases the likelihood of successful victim compromise, potentially leading to broader network infiltration and data breaches. The targeting of macOS systems, which are prevalent in many European tech firms, expands the attack surface beyond traditional Windows environments. Additionally, compromised credentials and stolen data can facilitate subsequent attacks, including fraudulent transactions, unauthorized access to critical infrastructure, and disruption of financial services. The campaign may also undermine trust in cryptocurrency platforms and delay adoption of decentralized finance solutions in Europe. Regulatory and compliance repercussions could arise if personal or financial data is exposed, impacting GDPR obligations.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to the unique tactics of UNC1069. Specific measures include: 1) Enhancing endpoint detection and response (EDR) capabilities on macOS systems to identify and block the novel malware families SILENCELIFT, DEEPBREATH, and CHROMEPUSH; 2) Deploying advanced email and messaging security solutions that incorporate AI-based anomaly detection to identify and quarantine AI-generated social engineering content; 3) Conducting targeted user awareness training focused on recognizing AI-driven social engineering tactics, including fake video calls and compromised messaging accounts; 4) Enforcing strict multi-factor authentication (MFA) across all cryptocurrency platforms, developer tools, and communication channels to limit credential misuse; 5) Monitoring network traffic for indicators of compromise related to the malware families and suspicious command-and-control communications; 6) Implementing robust credential hygiene practices, including regular password changes and use of hardware security keys; 7) Collaborating with threat intelligence sharing groups to stay updated on emerging UNC1069 tactics and indicators; 8) Applying least privilege principles to limit lateral movement and data access within networks; 9) Validating the integrity of software development environments and supply chains to prevent compromise; 10) Preparing incident response plans specifically addressing AI-enhanced social engineering and cryptocurrency theft scenarios.
Affected Countries
United Kingdom, Germany, France, Netherlands, Switzerland, Estonia, Luxembourg
Indicators of Compromise
- hash: 3712793d3847dd0962361aa528fa124c
- hash: 4e4f2dfe143ba261fd8a18d1c4b58f2e
- hash: c91725905b273e81e9cc6983a11c8d60
- hash: eb7635f4836c9e0aa4c315b18b051cb5
- hash: 03f00a143b8929585c122d490b6a3895d639c17d92c2223917e3a9ca1b8d30f9
- hash: 1a30d6cdb0b98feed62563be8050db55ae0156ed437701d36a7b46aabf086ede
- hash: 603848f37ab932dccef98ee27e3c5af9221d3b6ccfe457ccf93cb572495ac325
- hash: b452c2da7c012eda25a1403b3313444b5eb7c2c3e25eee489f1bd256f8434735
- hash: b525837273dde06b86b5f93f9aec2c29665324105b0b66f6df81884754f8080d
- hash: c3e5d878a30a6c46e22d1dd2089b32086c91f13f8b9c413aa84e1dbaa03b9375
- hash: c8f7608d4e19f6cb03680941bbd09fe969668bcb09c7ca985048a22e014dffcd
- hash: 0cb0c982cbd55207c4f4d95c193c382502f98bed
- hash: 4ab192b8b8298bbc157fa7d20e922bf00db7df58
- hash: 6b372fe49880513178857a66da43b6b760b2eac5
- hash: 710bfacd6d55a8794ce11b5143a85f9ca1854433
- hash: 75e0ecb0228e9d4575614c97710f9f42f48f3736
- hash: 8846fe4767326d60fe5d6f215bb5c7d308b0995c
- hash: ad20ee8be71f187596a450a4d9ab03dfca15567f
- hash: cd9cf6ec80415dca7ad4c6c976cf8f9df64f4428
- domain: breakdream.com
- domain: cmailer.pro
- domain: dreamdie.com
- domain: mylingocoin.com
- domain: support-zoom.us
- domain: supportzm.com
- domain: zmsupport.com
- domain: zoom.uswe05.us
- hash: 3712793d3847dd0962361aa528fa124c
- hash: 4e4f2dfe143ba261fd8a18d1c4b58f2e
- hash: c91725905b273e81e9cc6983a11c8d60
- hash: eb7635f4836c9e0aa4c315b18b051cb5
- yara: 0cb0c982cbd55207c4f4d95c193c382502f98bed
- yara: 4ab192b8b8298bbc157fa7d20e922bf00db7df58
- yara: 6b372fe49880513178857a66da43b6b760b2eac5
- yara: 710bfacd6d55a8794ce11b5143a85f9ca1854433
- yara: 75e0ecb0228e9d4575614c97710f9f42f48f3736
- yara: 8846fe4767326d60fe5d6f215bb5c7d308b0995c
- yara: ad20ee8be71f187596a450a4d9ab03dfca15567f
- yara: cd9cf6ec80415dca7ad4c6c976cf8f9df64f4428
Cryptocurrency Sector Targeted with New Tooling and AI-Enabled Social Engineering
Description
North Korean threat actor UNC1069 has evolved its tactics to target the cryptocurrency and decentralized finance sectors. In a recent intrusion, they deployed seven unique malware families, including new tools SILENCELIFT, DEEPBREATH, and CHROMEPUSH, designed to capture host and victim data. The attack utilized social engineering involving a compromised Telegram account, fake Zoom meeting, and reported AI-generated video. UNC1069 has shifted from spear-phishing to targeting Web3 industry entities like centralized exchanges, software developers, and venture capital firms. The intrusion demonstrated sophisticated techniques to bypass macOS security features and harvest credentials, browser data, and cryptocurrency information. This marks a significant expansion in UNC1069's capabilities and highlights their focus on financial theft and fueling future social engineering campaigns.
AI-Powered Analysis
Technical Analysis
UNC1069, a North Korean state-sponsored threat actor, has escalated its cyber operations by targeting the cryptocurrency and decentralized finance (DeFi) sectors with a sophisticated campaign deploying seven unique malware families, including newly identified tools SILENCELIFT, DEEPBREATH, and CHROMEPUSH. These malware families are engineered to evade macOS security mechanisms and focus on harvesting host system data, victim credentials, browser data, and cryptocurrency wallet information. The campaign employs advanced social engineering techniques enhanced by AI, such as leveraging compromised Telegram accounts, staging fake Zoom meetings, and using AI-generated deepfake videos to deceive victims. This represents a tactical shift from traditional spear-phishing to direct targeting of Web3 industry stakeholders, including centralized cryptocurrency exchanges, software developers, and venture capital firms involved in blockchain investments. The malware families incorporate various tactics aligned with MITRE ATT&CK techniques such as process injection (T1055.001), credential dumping (T1005), and user execution (T1204), indicating a multi-faceted approach to infiltration and data exfiltration. The campaign's sophistication and focus on financial theft underscore UNC1069's intent to monetize stolen data and credentials, potentially enabling further social engineering campaigns and financial fraud. Although no known public exploits are reported, the campaign's complexity and use of AI-enhanced deception elevate the threat profile significantly.
Potential Impact
For European organizations, particularly those involved in cryptocurrency trading, blockchain development, and venture capital investments in Web3 technologies, this threat poses substantial risks. Successful intrusions can lead to the theft of sensitive credentials, browser data, and cryptocurrency assets, resulting in direct financial losses and reputational damage. The use of AI-enabled social engineering increases the likelihood of successful victim compromise, potentially leading to broader network infiltration and data breaches. The targeting of macOS systems, which are prevalent in many European tech firms, expands the attack surface beyond traditional Windows environments. Additionally, compromised credentials and stolen data can facilitate subsequent attacks, including fraudulent transactions, unauthorized access to critical infrastructure, and disruption of financial services. The campaign may also undermine trust in cryptocurrency platforms and delay adoption of decentralized finance solutions in Europe. Regulatory and compliance repercussions could arise if personal or financial data is exposed, impacting GDPR obligations.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to the unique tactics of UNC1069. Specific measures include: 1) Enhancing endpoint detection and response (EDR) capabilities on macOS systems to identify and block the novel malware families SILENCELIFT, DEEPBREATH, and CHROMEPUSH; 2) Deploying advanced email and messaging security solutions that incorporate AI-based anomaly detection to identify and quarantine AI-generated social engineering content; 3) Conducting targeted user awareness training focused on recognizing AI-driven social engineering tactics, including fake video calls and compromised messaging accounts; 4) Enforcing strict multi-factor authentication (MFA) across all cryptocurrency platforms, developer tools, and communication channels to limit credential misuse; 5) Monitoring network traffic for indicators of compromise related to the malware families and suspicious command-and-control communications; 6) Implementing robust credential hygiene practices, including regular password changes and use of hardware security keys; 7) Collaborating with threat intelligence sharing groups to stay updated on emerging UNC1069 tactics and indicators; 8) Applying least privilege principles to limit lateral movement and data access within networks; 9) Validating the integrity of software development environments and supply chains to prevent compromise; 10) Preparing incident response plans specifically addressing AI-enhanced social engineering and cryptocurrency theft scenarios.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cloud.google.com/blog/topics/threat-intelligence/unc1069-targets-cryptocurrency-ai-social-engineering"]
- Adversary
- UNC1069
- Pulse Id
- 698a3590b78fb5ef2d81d5f1
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash3712793d3847dd0962361aa528fa124c | — | |
hash4e4f2dfe143ba261fd8a18d1c4b58f2e | — | |
hashc91725905b273e81e9cc6983a11c8d60 | — | |
hasheb7635f4836c9e0aa4c315b18b051cb5 | — | |
hash03f00a143b8929585c122d490b6a3895d639c17d92c2223917e3a9ca1b8d30f9 | — | |
hash1a30d6cdb0b98feed62563be8050db55ae0156ed437701d36a7b46aabf086ede | — | |
hash603848f37ab932dccef98ee27e3c5af9221d3b6ccfe457ccf93cb572495ac325 | — | |
hashb452c2da7c012eda25a1403b3313444b5eb7c2c3e25eee489f1bd256f8434735 | — | |
hashb525837273dde06b86b5f93f9aec2c29665324105b0b66f6df81884754f8080d | — | |
hashc3e5d878a30a6c46e22d1dd2089b32086c91f13f8b9c413aa84e1dbaa03b9375 | — | |
hashc8f7608d4e19f6cb03680941bbd09fe969668bcb09c7ca985048a22e014dffcd | — | |
hash0cb0c982cbd55207c4f4d95c193c382502f98bed | — | |
hash4ab192b8b8298bbc157fa7d20e922bf00db7df58 | — | |
hash6b372fe49880513178857a66da43b6b760b2eac5 | — | |
hash710bfacd6d55a8794ce11b5143a85f9ca1854433 | — | |
hash75e0ecb0228e9d4575614c97710f9f42f48f3736 | — | |
hash8846fe4767326d60fe5d6f215bb5c7d308b0995c | — | |
hashad20ee8be71f187596a450a4d9ab03dfca15567f | — | |
hashcd9cf6ec80415dca7ad4c6c976cf8f9df64f4428 | — | |
hash3712793d3847dd0962361aa528fa124c | — | |
hash4e4f2dfe143ba261fd8a18d1c4b58f2e | — | |
hashc91725905b273e81e9cc6983a11c8d60 | — | |
hasheb7635f4836c9e0aa4c315b18b051cb5 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbreakdream.com | — | |
domaincmailer.pro | — | |
domaindreamdie.com | — | |
domainmylingocoin.com | — | |
domainsupport-zoom.us | — | |
domainsupportzm.com | — | |
domainzmsupport.com | — | |
domainzoom.uswe05.us | — |
Yara
| Value | Description | Copy |
|---|---|---|
yara0cb0c982cbd55207c4f4d95c193c382502f98bed | — | |
yara4ab192b8b8298bbc157fa7d20e922bf00db7df58 | — | |
yara6b372fe49880513178857a66da43b6b760b2eac5 | — | |
yara710bfacd6d55a8794ce11b5143a85f9ca1854433 | — | |
yara75e0ecb0228e9d4575614c97710f9f42f48f3736 | — | |
yara8846fe4767326d60fe5d6f215bb5c7d308b0995c | — | |
yaraad20ee8be71f187596a450a4d9ab03dfca15567f | — | |
yaracd9cf6ec80415dca7ad4c6c976cf8f9df64f4428 | — |
Threat ID: 698a44134b57a58fa16f31b6
Added to database: 2/9/2026, 8:31:15 PM
Last enriched: 2/9/2026, 8:46:47 PM
Last updated: 2/12/2026, 1:54:21 AM
Views: 116
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
The game is over: when “free” comes at too high a price. What we know about RenEngine
MediumApple Patches Everything: February 2026, (Wed, Feb 11th)
MediumNorth Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
MediumA Peek Into Muddled Libra's Operational Playbook
MediumSilent Push Traffic Origin Data Combined with Residential Proxy Data Uncovers Suspicious Chinese VPN
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.