It was reported that North Korean are it again, targeting cryptocurrency industry. So if you are in the crypto sector be better that you know about this kind of attacks.
1. thru social engineering attack, the compromised account will contact you in telegram and try to build a rapport. And you will thought that you are really talking to the higher ups of that crypto company.
2. And then, once everything is set up, you will be shown a video conference, which is obviously a fake video of another crypto company's CEO
3. Once you are in the meeting, suddenly this criminals will give you the impression that is something wrong with the video, be the audio or the video itself.
4. Then criminals will ask you to download in the guise of troubleshooting and that's where you are going to be trap
The thing is that it's not just one malware, but
seven in total.

The first malicious executable file deployed to the system was a packed backdoor tracked by Mandiant as WAVESHAPER. WAVESHAPER served as a conduit to deploy a downloader tracked by Mandiant as HYPERCALL as well as subsequent additional tooling to considerably expand the adversary's foothold on the system....
DEEPBREATH, a data miner written in Swift, was deployed via HIDDENCALL—the follow-on backdoor component to HYPERCALL. DEEPBREATH manipulates the Transparency, Consent, and Control (TCC) database to gain broad file system access, enabling it to steal...
SILENCELIFT is a minimalistic backdoor written in C/C++ that beacons host information to a hard-coded C&C server. The C&C server identified in this sample was identified as support-zoom[.]us.
Mandiant identified two disparate data miners that were deployed by the threat actor during their access period: DEEPBREATH and CHROMEPUSH.
Mandiant also identified HYPERCALL deployed an additional malware loader, tracked as part of the code family SUGARLOADER. A persistence mechanism was installed in the form of a launch daemon for SUGARLOADER, which configured the system to execute the malware during the macOS startup process. The launch daemon was configured through a property list (Plist) file,
https://cloud.google.com/blog/topics/threat-intelligence/unc1069-targets-cryptocurrency-ai-social-engineering
So this is really a very dangerous campaign from these hackers as it is a very sophisticated attack with Deep fake AI and then those malwares that they used. So again, if yo uare in the crypto sector, from support staff to a more high pay grade position, just be careful with this trick.