Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    RFK Jr. Faces HHS Budget Cuts Hearing

    April 16, 2026

    NJ Special Election Tests House GOP Majority

    April 16, 2026

    Anthropic Trust Adds Novartis CEO to Board

    April 16, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram LinkedIn
    Ai Crypto TimesAi Crypto Times
    • Altcoins
      • Coinbase
      • Litecoin
      • Bitcoin
    • Ethereum
    • Crypto
    • Blockchain
    • Lithosphere News Releases
    Ai Crypto TimesAi Crypto Times
    Home » Zerion hit by AI-enabled social engineering as North Korean hackers target human layer
    Crypto

    Zerion hit by AI-enabled social engineering as North Korean hackers target human layer

    James WilsonBy James WilsonApril 15, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    North Korean hackers are increasingly bypassing high-tech security barriers by weaponizing artificial intelligence to manipulate the employees behind the code.

    Summary

    • Zerion confirmed a $100,000 security breach after North Korean hackers used artificial intelligence to impersonate trusted contacts and compromise hot wallet credentials.
    • The Security Alliance identified a cluster of 164 malicious domains used in low-pressure campaigns to infiltrate crypto firms through platforms like Slack and LinkedIn.

    Zerion, a popular crypto wallet provider, confirmed on Wednesday that a long-term social engineering campaign linked to the DPRK successfully breached its systems last week. 

    While the hackers walked away with roughly $100,000 from the company’s hot wallets, the breach serves as a stark warning about the rising sophistication of “AI-enabled” identity theft within the digital asset industry.

    The company reported that the attackers managed to hijack active login sessions and credentials belonging to team members, eventually gaining access to private keys. 

    Despite the intrusion, Zerion’s internal post-mortem verified that user funds and core infrastructure remained untouched, though the web app was briefly taken offline as a preventative measure. 

    This incident follows a much larger $280 million exploit of Drift Protocol earlier this month, which security analysts described as a “structured intelligence operation” rather than a simple technical bug.

    The Security Alliance (SEAL) recently highlighted the scale of this threat after tracking and blocking 164 domains linked to the North Korean group UNC1069. 

    Their findings suggest the group specializes in “multiweek, low-pressure social engineering campaigns” conducted across platforms like Slack, Telegram, and LinkedIn. 

    By impersonating trusted colleagues or established brands, these actors slowly erode the targets’ defenses before deploying malicious payloads.

    “UNC1069’s social engineering methodology is defined by patience, precision, and the deliberate weaponization of existing trust relationships,” SEAL noted in its investigation.

    This methodical approach is now being bolstered by generative tools. Google’s Mandiant unit previously identified the use of AI to create deepfake images and videos, allowing hackers to pose as legitimate participants in Zoom meetings. 

    The goal is to move past traditional phishing and create a digital environment where a victim has no reason to doubt the person on the other side of the screen.

    MetaMask developer Taylor Monahan recently pointed out that this isn’t a new phenomenon, but rather the perfection of a decades-long strategy. 

    North Korean IT workers have been quietly integrating themselves into decentralized finance projects and crypto firms for at least seven years, often operating as legitimate contributors.

    The blockchain security firm Elliptic explained in a recent analysis that the risk profile for the industry has fundamentally changed. 

    “The evolution of the DPRK’s social engineering techniques, combined with the increasing availability of AI to refine and perfect these methods, means the threat extends well beyond exchanges,” the firm stated. 

    Individual developers and any staffer with access to internal infrastructure are now viewed as primary entry points for state-sponsored theft, the researcher added.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    James Wilson

    Related Posts

    RFK Jr. Faces HHS Budget Cuts Hearing

    April 16, 2026

    NJ Special Election Tests House GOP Majority

    April 16, 2026

    Anthropic Trust Adds Novartis CEO to Board

    April 16, 2026

    Comments are closed.

    Our Picks
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss

    RFK Jr. Faces HHS Budget Cuts Hearing

    Crypto April 16, 2026

    RFK Jr. HHS budget cuts of roughly $16 billion faced their first major congressional test…

    NJ Special Election Tests House GOP Majority

    April 16, 2026

    Anthropic Trust Adds Novartis CEO to Board

    April 16, 2026

    UK’s FCA opens final crypto consultation ahead of 2027 regime switch-on

    April 16, 2026

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    New SEC–CFTC crypto framework clarifies token status and DeFi exposure

    March 23, 2026

    SafeMoon’s image was carefully curated — and misleading, witness says

    April 3, 2026

    Ripple and Kyobo Life partner to modernize bond markets in South Korea

    April 15, 2026
    Recent Posts

    RFK Jr. Faces HHS Budget Cuts Hearing

    April 16, 2026

    NJ Special Election Tests House GOP Majority

    April 16, 2026

    Anthropic Trust Adds Novartis CEO to Board

    April 16, 2026

    Type above and press Enter to search. Press Esc to cancel.