North Korea’s Lazarus Group is leveling up its social engineering playbook, now using fake Zoom calls and deepfakes to target crypto insiders. Manta Network’s co-founder, Kenny Li, shared his close call—faces he recognized appeared on a video call, but no one spoke. Then came the classic trap: “download a script to fix your audio.”

These attacks aren't just random phishing attempts. They’re strategic, using deepfakes, stolen IDs, and psychological tricks. Security experts are calling it out: this isn't amateur hour. With Lazarus linked to billion-dollar crypto heists, their tactics are evolving fast—and it’s not just Li getting targeted.

The takeaway? If something feels off, it probably is.

Conclusion:

Crypto leaders need to treat every call and message like a potential threat. The Lazarus Group isn’t just phishing—they’re casting nets with Hollywood-level tricks. Stay sharp.

Takeaways:

  • Lazarus Group uses fake Zoom calls with deepfakes and malware to trick targets.

  • Kenny Li of Manta Network avoided an attack by refusing to download a “fix.”

  • Experts warn of evolving tactics from North Korean cyber units.

  • Always verify video calls and avoid running unknown scripts or downloads.

Source: Decrypt

$BTC

$ETH

$SOL

#SolanaSurge