Hackers Use ClickFix Scam to Target Crypto Executive via Fake Zoom Meetings

Google-owned Mandiant Cybersecurity Consulting has published a detailed report about the new ClickFix scam.

Advertisement
Written by Dhruv Raghav, Edited by David Delima | Updated: 11 February 2026 18:26 IST
Highlights
  • Hackers use AI-generated fake videos to dupe victims
  • ClickFix victims are initially contacted through Telegram
  • Bad actors ran cryptocurrency theft campaigns

Hackers can use compromised Telegram accounts to send Zoom links to victims

Photo Credit: Unsplash/NordWood Themes

A North Korea-based hacker group is specifically targeting executives of cryptocurrency and decentralised finance companies to run crypto theft campaigns, according to a Google-owned cybersecurity consulting firm. The hackers use compromised Telegram accounts to infect targeted systems and fake Zoom meeting links to dupe victims. After gaining access to their victims' credentials and accounts, the hackers change passwords to block user access. When a user joins the fake Zoom meeting, they are shown AI-generated videos to gain their victims' trust.

North Korean Hackers Use AI-Generated Videos to Dupe Crypto Executives via ClickFix

The Record reports that a group of North Korean hackers targeted a cryptocurrency company official via a fake Zoom meeting, various malware, and social engineering manoeuvres. On Tuesday, Google-owned Mandiant Cybersecurity Consulting published a report detailing the modus operandi of UNC1069 hackers who exploit the ClickFix scam to specifically target entities in the cryptocurrency and decentralised finance industry.

Mandiant explained that the North Korean bad actor employed a social engineering scheme, where the victim was contacted via a “compromised Telegram account”. A fake Zoom meeting link is then sent to the user, which contains the ClickFix infection vector. In the Zoom meeting, the victims are shown AI-generated deep fake videos of people to make the Zoom meeting appear genuine.

Advertisement

As part of the ClickFix scam, the UNC1069 hacker deploys seven “unique malware families”, which Mandiant calls SILENCELIFT, DEEPBREATH, and CHROMEPUSH, which are a set of tools specifically designed to access the data of the victim. Hackers also use multiple infected files, dubbed WAVESHAPER and HYPERCALL, to gain backdoor access to the victim's system. User details such as credentials, browser data, and session tokens are stolen by bad actors for cryptocurrency and other types of financial scams.

Advertisement

The cybersecurity consulting firm also highlighted that the UNC1069 threat actor has expanded into injecting targeted systems with new malware families, along with SUGARLOADER, moving from AI-enabled attacks. The UNC1069 hacker is known for using Gemini to “develop tooling, conduct operational research, and assist” while researching about the victim, according to a report by Google Threat Intelligence Group (GITG).

Similar to the latest reported incident, in May 2025, Ryan Kim, a Founding Partner at Hashed, a blockchain firm, shared that he was recently targeted by a group of hackers via Telegram. A meeting was set up by Kim through Calendly. Later, a fake Zoom meeting link was sent to him, prompting as a Zoom SDK update, which then turned out to be malware. When Kim joined the meeting, he saw various personalities from the crypto industry.

Advertisement

He highlighted that the audio did not work on Zoom, and other attendees appeared to be deepfakes. The Hashed executive was again prompted to install the SDK update, which he did, unknowingly infecting his system in the process. Using the Telegram Desktop session, the attacker was able to restrict access to the instant messaging app from other devices, while also changing his password and recovery mail. The bad actor was even able to bypass 2FA on Telegram.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: ClickFix Scam, Zoom, Cryptocurrency, Google
Advertisement
Popular Mobile Brands
  1. Anaganaga Oka Raju Now Streaming on OTT: What You Need to Know
  2. Samsung Galaxy S26 Series Will Be Available via These E-Commerce Platforms
  3. Samsung Galaxy S26 Series Pricing, Specs Leak As Galaxy Unpacked Nears
  4. Motorola Edge 70 Fusion Renders Leaked Again: See Design and Colourways
  5. Samsung Announces Galaxy S26 Series Launch Date as Pre-Reservations Begin
  6. Zeiss Aatma Lenses With Retro Design Unveiled in India: See Availability
  7. iPhone 18 Pro Series May Arrive at Same Price Despite Rising Memory Costs
  8. Nothing Phone 4a Pro Listed on UAE's TDRA Database, Might Launch Soon
  9. Instagram Might Take On Sora With Its AI-Powered Face Swap Feature
  10. Hackers Targeted Crypto CEO via Fake Zoom Meetings Using This Scam
  1. SPHEREx Captures Dramatic Outburst of Interstellar Comet 3I/ATLAS
  2. Microsoft Warns AI Tools With Excessive Privileges Could Act as ‘Double Agents’
  3. Sony WF‑1000XM6 Leak Reveals Size Differences With WF‑1000XM5 and WF‑1000XM4
  4. Android 17 Beta 1 Expected to Roll Out to Eligible Pixel Devices Soon: Expected UI Changes, Features
  5. Lumio Vision TVs to Receive Android 14 Update With Performance Improvements; Arc Projector to Follow
  6. Maruva Tarama OTT Release Date: When and Where to Watch it Online?
  7. Hackers Use ClickFix Scam to Target Crypto Executive via Fake Zoom Meetings
  8. Heated Rivalry OTT Release Date Revealed: Know When and Where to Watch it Online
  9. The Maadhar Streaming Now on OTTPlus: Know Everything About This Tamil Short Thriller Film
  10. Anaganaga Oka Raju Now Streaming on OTT: What You Need to Know About This Telugu Comedy Movie
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.