Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

0
Medium
Vulnerabilitywindowsmacos
Published: Wed Feb 11 2026 (02/11/2026, 06:50:00 UTC)
Source: The Hacker News

Description

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated

AI-Powered Analysis

AILast updated: 02/11/2026, 12:14:44 UTC

Technical Analysis

UNC1069, a North Korea-linked threat actor active since at least 2018, has shifted focus from traditional finance to the cryptocurrency sector, targeting Windows and macOS systems to steal sensitive data and facilitate financial theft. The attack chain starts with social engineering via compromised or impersonated Telegram accounts, where victims are lured into fake Zoom meetings hosted on phishing domains mimicking legitimate Zoom URLs. These meetings use AI-generated or deepfake video to create a convincing illusion of a live call, tricking victims into enabling their cameras and entering personal details. Following this, victims receive a fake error message prompting them to run a ClickFix-style troubleshooting command. On macOS, this command executes an AppleScript that drops a malicious Mach-O binary named WAVESHAPER, which collects system info and deploys multiple malware families including HYPERCALL (a Go-based downloader), HIDDENCALL (a Golang backdoor), DEEPBREATH (a Swift data miner capable of bypassing macOS TCC protections to steal iCloud Keychain and browser data), SUGARLOADER (a C++ downloader), CHROMEPUSH (a C++ browser extension data stealer with keylogging and cookie theft capabilities), and SILENCELIFT (a minimalist backdoor). These tools collectively harvest credentials, session tokens, and sensitive data from browsers (Chrome, Brave, Edge), Telegram, and Apple Notes, enabling financial theft. The campaign demonstrates advanced use of AI for lure creation and malware development, reflecting a significant evolution in UNC1069’s operational sophistication. The attack is highly targeted at cryptocurrency startups, software developers, venture capital firms, and high-tech companies, leveraging social engineering, AI, and multi-stage malware deployment to maximize impact.

Potential Impact

European organizations in the cryptocurrency ecosystem face significant risks from UNC1069’s campaign. The theft of credentials, session tokens, and sensitive data can lead to direct financial losses through unauthorized cryptocurrency transfers or theft. Compromise of software developers and venture capital firms could result in intellectual property theft, disruption of funding activities, and reputational damage. The use of AI-generated lures and deepfake videos increases the likelihood of successful social engineering, making detection and prevention more challenging. The multi-platform nature of the attack (Windows and macOS) broadens the scope of affected systems. The campaign’s stealthy backdoors and data stealers can persist undetected, enabling prolonged espionage and financial fraud. For European financial and tech sectors, this threat could undermine trust in cryptocurrency markets and impact regulatory compliance, especially under GDPR due to potential data breaches. The sophistication and targeted nature of the attack suggest it is designed for high-value victims, increasing the potential for significant economic and operational disruption.

Mitigation Recommendations

European organizations should implement multi-layered defenses tailored to this threat’s unique tactics. First, enhance user awareness training focused on recognizing AI-generated and deepfake social engineering lures, especially on platforms like Telegram and Zoom. Implement strict URL filtering and domain reputation checks to block access to phishing domains mimicking legitimate services. Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious AppleScript executions and unusual downloader behaviors on macOS and Windows. Enforce application whitelisting and restrict the execution of unapproved scripts and binaries. Monitor network traffic for connections to known or suspicious command-and-control servers associated with UNC1069 malware families. Use multi-factor authentication (MFA) on all cryptocurrency-related accounts and internal systems to reduce credential theft impact. Regularly audit and harden macOS Transparency, Consent, and Control (TCC) settings to limit unauthorized access to sensitive data stores like iCloud Keychain. Conduct threat hunting exercises focusing on indicators of compromise related to WAVESHAPER, DEEPBREATH, CHROMEPUSH, and other malware components. Collaborate with threat intelligence sharing communities to stay updated on UNC1069 tactics and indicators. Finally, establish incident response plans specifically addressing social engineering and multi-stage malware attacks targeting cryptocurrency assets.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/north-korea-linked-unc1069-uses-ai.html","fetched":true,"fetchedAt":"2026-02-11T12:13:29.662Z","wordCount":1420}

Threat ID: 698c726b4b57a58fa193ba9e

Added to database: 2/11/2026, 12:13:31 PM

Last enriched: 2/11/2026, 12:14:44 PM

Last updated: 2/11/2026, 2:41:18 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats