Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Cryptocurrency Sector Targeted with New Tooling and AI-Enabled Social Engineering

0
Medium
Published: Mon Feb 09 2026 (02/09/2026, 19:29:20 UTC)
Source: AlienVault OTX General

Description

North Korean threat actor UNC1069 has evolved its tactics to target the cryptocurrency and decentralized finance sectors. In a recent intrusion, they deployed seven unique malware families, including new tools SILENCELIFT, DEEPBREATH, and CHROMEPUSH, designed to capture host and victim data. The attack utilized social engineering involving a compromised Telegram account, fake Zoom meeting, and reported AI-generated video. UNC1069 has shifted from spear-phishing to targeting Web3 industry entities like centralized exchanges, software developers, and venture capital firms. The intrusion demonstrated sophisticated techniques to bypass macOS security features and harvest credentials, browser data, and cryptocurrency information. This marks a significant expansion in UNC1069's capabilities and highlights their focus on financial theft and fueling future social engineering campaigns.

AI-Powered Analysis

AILast updated: 02/09/2026, 20:46:47 UTC

Technical Analysis

UNC1069, a North Korean state-sponsored threat actor, has escalated its cyber operations by targeting the cryptocurrency and decentralized finance (DeFi) sectors with a sophisticated campaign deploying seven unique malware families, including newly identified tools SILENCELIFT, DEEPBREATH, and CHROMEPUSH. These malware families are engineered to evade macOS security mechanisms and focus on harvesting host system data, victim credentials, browser data, and cryptocurrency wallet information. The campaign employs advanced social engineering techniques enhanced by AI, such as leveraging compromised Telegram accounts, staging fake Zoom meetings, and using AI-generated deepfake videos to deceive victims. This represents a tactical shift from traditional spear-phishing to direct targeting of Web3 industry stakeholders, including centralized cryptocurrency exchanges, software developers, and venture capital firms involved in blockchain investments. The malware families incorporate various tactics aligned with MITRE ATT&CK techniques such as process injection (T1055.001), credential dumping (T1005), and user execution (T1204), indicating a multi-faceted approach to infiltration and data exfiltration. The campaign's sophistication and focus on financial theft underscore UNC1069's intent to monetize stolen data and credentials, potentially enabling further social engineering campaigns and financial fraud. Although no known public exploits are reported, the campaign's complexity and use of AI-enhanced deception elevate the threat profile significantly.

Potential Impact

For European organizations, particularly those involved in cryptocurrency trading, blockchain development, and venture capital investments in Web3 technologies, this threat poses substantial risks. Successful intrusions can lead to the theft of sensitive credentials, browser data, and cryptocurrency assets, resulting in direct financial losses and reputational damage. The use of AI-enabled social engineering increases the likelihood of successful victim compromise, potentially leading to broader network infiltration and data breaches. The targeting of macOS systems, which are prevalent in many European tech firms, expands the attack surface beyond traditional Windows environments. Additionally, compromised credentials and stolen data can facilitate subsequent attacks, including fraudulent transactions, unauthorized access to critical infrastructure, and disruption of financial services. The campaign may also undermine trust in cryptocurrency platforms and delay adoption of decentralized finance solutions in Europe. Regulatory and compliance repercussions could arise if personal or financial data is exposed, impacting GDPR obligations.

Mitigation Recommendations

European organizations should implement multi-layered defenses tailored to the unique tactics of UNC1069. Specific measures include: 1) Enhancing endpoint detection and response (EDR) capabilities on macOS systems to identify and block the novel malware families SILENCELIFT, DEEPBREATH, and CHROMEPUSH; 2) Deploying advanced email and messaging security solutions that incorporate AI-based anomaly detection to identify and quarantine AI-generated social engineering content; 3) Conducting targeted user awareness training focused on recognizing AI-driven social engineering tactics, including fake video calls and compromised messaging accounts; 4) Enforcing strict multi-factor authentication (MFA) across all cryptocurrency platforms, developer tools, and communication channels to limit credential misuse; 5) Monitoring network traffic for indicators of compromise related to the malware families and suspicious command-and-control communications; 6) Implementing robust credential hygiene practices, including regular password changes and use of hardware security keys; 7) Collaborating with threat intelligence sharing groups to stay updated on emerging UNC1069 tactics and indicators; 8) Applying least privilege principles to limit lateral movement and data access within networks; 9) Validating the integrity of software development environments and supply chains to prevent compromise; 10) Preparing incident response plans specifically addressing AI-enhanced social engineering and cryptocurrency theft scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://cloud.google.com/blog/topics/threat-intelligence/unc1069-targets-cryptocurrency-ai-social-engineering"]
Adversary
UNC1069
Pulse Id
698a3590b78fb5ef2d81d5f1
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash3712793d3847dd0962361aa528fa124c
hash4e4f2dfe143ba261fd8a18d1c4b58f2e
hashc91725905b273e81e9cc6983a11c8d60
hasheb7635f4836c9e0aa4c315b18b051cb5
hash03f00a143b8929585c122d490b6a3895d639c17d92c2223917e3a9ca1b8d30f9
hash1a30d6cdb0b98feed62563be8050db55ae0156ed437701d36a7b46aabf086ede
hash603848f37ab932dccef98ee27e3c5af9221d3b6ccfe457ccf93cb572495ac325
hashb452c2da7c012eda25a1403b3313444b5eb7c2c3e25eee489f1bd256f8434735
hashb525837273dde06b86b5f93f9aec2c29665324105b0b66f6df81884754f8080d
hashc3e5d878a30a6c46e22d1dd2089b32086c91f13f8b9c413aa84e1dbaa03b9375
hashc8f7608d4e19f6cb03680941bbd09fe969668bcb09c7ca985048a22e014dffcd
hash0cb0c982cbd55207c4f4d95c193c382502f98bed
hash4ab192b8b8298bbc157fa7d20e922bf00db7df58
hash6b372fe49880513178857a66da43b6b760b2eac5
hash710bfacd6d55a8794ce11b5143a85f9ca1854433
hash75e0ecb0228e9d4575614c97710f9f42f48f3736
hash8846fe4767326d60fe5d6f215bb5c7d308b0995c
hashad20ee8be71f187596a450a4d9ab03dfca15567f
hashcd9cf6ec80415dca7ad4c6c976cf8f9df64f4428
hash3712793d3847dd0962361aa528fa124c
hash4e4f2dfe143ba261fd8a18d1c4b58f2e
hashc91725905b273e81e9cc6983a11c8d60
hasheb7635f4836c9e0aa4c315b18b051cb5

Domain

ValueDescriptionCopy
domainbreakdream.com
domaincmailer.pro
domaindreamdie.com
domainmylingocoin.com
domainsupport-zoom.us
domainsupportzm.com
domainzmsupport.com
domainzoom.uswe05.us

Yara

ValueDescriptionCopy
yara0cb0c982cbd55207c4f4d95c193c382502f98bed
yara4ab192b8b8298bbc157fa7d20e922bf00db7df58
yara6b372fe49880513178857a66da43b6b760b2eac5
yara710bfacd6d55a8794ce11b5143a85f9ca1854433
yara75e0ecb0228e9d4575614c97710f9f42f48f3736
yara8846fe4767326d60fe5d6f215bb5c7d308b0995c
yaraad20ee8be71f187596a450a4d9ab03dfca15567f
yaracd9cf6ec80415dca7ad4c6c976cf8f9df64f4428

Threat ID: 698a44134b57a58fa16f31b6

Added to database: 2/9/2026, 8:31:15 PM

Last enriched: 2/9/2026, 8:46:47 PM

Last updated: 2/12/2026, 1:54:21 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats