Google Alerts to AI-Enhanced North Korean Cyberattacks Focusing on Cryptocurrency and Decentralized Finance Sectors

Google's security team at Mandiant warns of North Korean cybercriminals employing AI-generated deepfakes to mimic crypto executives in fake Zoom meetings, marking a significant escalation in phishing tactics. These sophisticated attacks have enabled the theft of over $2 billion in cryptocurrency in 2025, revealing how cyber threats are evolving with technology to exploit corporate communication systems.

Nathan Mercer

February 11, 2026

North Korean cybercriminals, notorious for their persistence, have taken a leap into the future with their latest series of attacks on the cryptocurrency sector. Google's security team at Mandiant has issued a stark warning that these attacks are not just sophisticated but are also utilizing AI-generated deepfakes to spoof Zoom meetings, escalating the phishing game to unprecedented levels.

The details are as unnerving as they are innovative. Mandiant's recent investigation uncovered an intrusion at a fintech company where attackers, identified as UNC1069 or "CryptoCore," hijacked a Telegram account to establish initial contact. The victim was then lured into a fake Zoom meeting complete with AI-generated video of a well-known crypto executive. This high-tech masquerade was designed to secure trust before hitting the victim with malware-laden commands, under the guise of troubleshooting audio issues during the call.

Furthermore, the scale of these thefts is staggering. According to Chainalysis, North Korean hackers managed to pilfer a hefty $2.02 billion in cryptocurrency in 2025 alone. What is particularly alarming is not just the amount but the efficiency of these operations; they are achieving larger thefts through fewer, but highly targeted, incidents. This points to a dangerous evolution in cyber threats where impersonation and social engineering are finely tuned using the latest AI tools.

These attacks exploit the fundamental trust and operational routines within corporate environments. Routine digital interactions, like calendar invites and video calls, which are generally perceived as safe, are now emerging fronts in cyber warfare. The use of deepfake technology introduces a chilling new dimension to these threats. Seeing, as they say, is believing-and when the face and voice of a known figure are convincingly reproduced, the critical instinct to double-check can momentarily falter.

As Fraser Edwards from cheqd points out, the effectiveness of these attacks springs from their mimicry of normal interactions. The attackers meticulously craft messages and emulate normal communication patterns using AI. This not only makes detection harder but also enables the execution of these scams at a scale and speed that were previously unimaginable. Edwards warns of an increasing risk as AI agents become more embedded in our communication systems, potentially turning manual impersonation efforts into automated, scalable operations.

For companies in the crypto and fintech sectors, this development should serve as a clear signal to tighten not just their technological defenses but also their operational protocols around digital communication. Rigorous verification processes, continuous staff training on security practices, and enhanced scrutiny of digital interactions are becoming indispensable in a landscape where attackers are rapidly adapting new technologies for malicious use. It’s a classic case of an old warning clothed in new tech: Trust, but verify. Always.

In response to these threats, deploying robust cybersecurity measures and investing in the latest fraud detection technologies are not just advisable, they are essential. Companies might also explore services like those offered by Radom, which include secure on- and off-ramping solutions that could safeguard against such sophisticated threats in the digital transaction space.

As technology evolves, so too does the nature of cyber threats. North Korea's latest tactics in the crypto sector underscore an urgent need for dynamic and proactive defense strategies. In the arms race that is cybersecurity, staying ahead doesn't just mean keeping pace with technology, but anticipating how it can be misused before it happens.

Sign up to Radom to get started