Deepfake Zoom Scams Hit Crypto Insiders as BTC Prague Co-Founder Warns of Mac Malware
Key Takeaways:Deepfake Video Calls Used as the Entry PointNorth Korea–Linked Malware Chain Targets Mac UsersHow the Mac Infection WorksCrypto Theft Campaigns Grow More Sophisticated
Huntress researchers point out that Mac is an excellent target because an increasing number of crypto groups deploy Macs to the enterprise. Deepfake video injects strongly in the credibility equation, combining real-time images with the known platform.
Basic security habits revealed by Kuchař assisted in curtailing his losses. He emphasized the use of two-factor authentication, password solution, and hardware wallets. He also recommended more secure communication tools, such as Signal or Jitsi, and better browsers over more secure calls, such as Google Meet due to greater sandboxing.
