North Korea’s Lazarus Group is leveling up its social engineering playbook, now using fake Zoom calls and deepfakes to target crypto insiders. Manta Network’s co-founder, Kenny Li, shared his close call—faces he recognized appeared on a video call, but no one spoke. Then came the classic trap: “download a script to fix your audio.”
These attacks aren't just random phishing attempts. They’re strategic, using deepfakes, stolen IDs, and psychological tricks. Security experts are calling it out: this isn't amateur hour. With Lazarus linked to billion-dollar crypto heists, their tactics are evolving fast—and it’s not just Li getting targeted.
The takeaway? If something feels off, it probably is.
Conclusion:
Crypto leaders need to treat every call and message like a potential threat. The Lazarus Group isn’t just phishing—they’re casting nets with Hollywood-level tricks. Stay sharp.
Takeaways:
Lazarus Group uses fake Zoom calls with deepfakes and malware to trick targets.
Kenny Li of Manta Network avoided an attack by refusing to download a “fix.”
Experts warn of evolving tactics from North Korean cyber units.
Always verify video calls and avoid running unknown scripts or downloads.
Source: Decrypt
