C
CryptoToday
Back to all articles
cybersecurityDPRKphishingZoomMicrosoft TeamsTelegramcybercrime2FAsocial engineering

Beware DPRK Cyber Threats: How Fake Zoom and Teams Meetings Are Leading to $300M in Theft

An in-depth look at how North Korean threat actors are exploiting fake Zoom and Microsoft Teams meetings to hijack Telegram accounts, resulting in over $300 million in theft, and practical steps you can take to protect yourself.

cryptoNewsToday
7 min read
Beware DPRK Cyber Threats: How Fake Zoom and Teams Meetings Are Leading to $300M in Theft

Beware DPRK Cyber Threats: How Fake Zoom and Teams Meetings Are Leading to $300M in Theft

In recent months, cybersecurity professionals have uncovered a highly sophisticated campaign orchestrated by North Korean (DPRK) threat actors, leveraging fake Zoom and Microsoft Teams meetings to execute widespread cyberattacks. These deceptive meetings serve as a ruthless conduit for compromising users' Telegram accounts, with devastating financial repercussions exceeding $300 million.

How DPRK Threat Actors Exploit Video Conferencing Platforms

The attackers craft highly convincing fake video conference invitations that mimic legitimate Zoom and Microsoft Teams meetings. By exploiting trust in common workplace communication tools, they entice victims to join these bogus sessions. Once inside, attackers employ a combination of social engineering, including impersonation and manipulation, as well as deploying tailored malware to infiltrate users’ devices.

A critical objective of these attacks is to gain unauthorized access to victims' Telegram accounts—a popular messaging platform widely used for both personal and professional communication. This access allows threat actors to impersonate victims and launch further scams, spreading the attack across the victims’ contact lists to amplify the financial and reputational damage.

The Mechanics Behind Telegram Account Takeovers

After persuading or tricking the victim during the fake meeting, the attackers typically request or intercept Telegram verification codes (often via SMS or in-app notifications). With these codes, they bypass authentication, gaining control over the account. Once inside, they exploit the trust relationship with the victim’s contacts to request funds or sensitive information under false pretenses.

Financial Impact and Global Reach

Reported losses attributable to this campaign have already exceeded $300 million, showcasing the alarming effectiveness and global scale of this modus operandi. The combination of familiar technology platforms and targeted social engineering enables attackers to penetrate organizations and individuals alike, irrespective of geography.

Additional Tactics Observed in the Campaign

Beyond fake meetings, threat actors use the following strategies:

  • Impersonation of trusted contacts: Using compromised Telegram accounts to send fraudulent payment requests.
  • Rapid account lockouts: After extracting funds, accounts get locked or deleted to cover tracks.
  • Continuous adaptation: Attackers frequently update phishing lures and malware to evade detection.

How You Can Defend Against These Attacks

To protect yourself and your contacts, consider these comprehensive security measures:

  • Always verify meeting invitations: Cross-check meeting links and details using independent sources, such as contacting the organizer directly through trusted channels.
  • Enable two-factor authentication (2FA): Activate 2FA not only on Telegram but on all critical accounts, using authenticator apps or hardware tokens where possible.
  • Exercise skepticism with unexpected requests: Treat unsolicited messages—especially those requesting money or sensitive information—with caution and verify before responding.
  • Keep your software patched and updated: Regularly update conferencing software, messaging apps, and device operating systems to mitigate vulnerabilities.
  • Educate your network: Share awareness about these emerging threats with colleagues, friends, and family to break the chain of infection.

Staying Informed and Proactive

The landscape of cyber threats is ever-changing. To stay ahead:

  • Follow reputable cybersecurity news outlets and official advisories.
  • Consider using security solutions that monitor for credential breaches and phishing attempts.
  • Participate in organizational cybersecurity training programs.

Conclusion: Vigilance is Key

The ingenuity of DPRK threat actors in exploiting trusted communication platforms highlights the critical need for vigilance, strong security practices, and community education. By understanding the warning signs and implementing robust defenses, you can significantly reduce the risk of falling victim to these costly scams.


Stay informed, stay secure, and help protect those around you.

Warning Praying Hands

Share this article