BlueNoroff Deepfake Zoom Attack: 100 Crypto Executives Compromised in 5 Minutes
BlueNoroff's fake Zoom campaign has compromised more than 100 cryptocurrency executives and Web3 founders, achieving full system compromise in under five minutes by combining AI-generated deepfake participants with ClickFix clipboard injection. Arctic Wolf published the complete technical breakdown on April 29, 2026, exposing a self-sustaining deepfake pipeline where each new victim's webcam footage is recycled into bait for the next attack — a mechanism that makes the campaign increasingly convincing as it expands.
The BlueNoroff deepfake Zoom attack begins months before the victim ever sees a link. A North Korean operator, posing as a legal professional at a fintech consulting firm, sends a Calendly invite for a routine catch-up call. When the victim confirms, the attacker silently replaces the Google Meet calendar link with a typo-squatted Zoom URL designed to look nearly identical to the legitimate platform. The HTML page behind the link renders a convincing fake meeting room populated with three types of participants: stolen webcam footage from prior victims, AI-generated still images created using ChatGPT's GPT-4o model, and deepfake composite videos combining AI-generated faces with operator body movement recorded inside a Windows virtual machine.
The threat is active right now. Arctic Wolf's analysis mapped operator activity to Korean Standard Time business hours, confirmed 121 intrusion events in March 2026 alone, and documented 45% of targets as CEOs or co-founders with direct authority over cryptocurrency wallets and private keys. If your organization operates in Web3, DeFi, venture capital, or adjacent fintech sectors, your executives are the intended target.
How Does the BlueNoroff Deepfake Zoom Attack Work?
The BlueNoroff deepfake Zoom attack executes a four-stage kill chain that completes full system compromise in under five minutes from initial click, using no traditional exploit and no user-installed software.
Stage one begins with a Calendly invite. A BlueNoroff operator posing as a fintech legal professional sends an invite to a target executive, scheduling a meeting months in the future to avoid suspicion. When the victim confirms, the attacker swaps the generated Google Meet link for a typo-squatted Zoom URL, such as uu03webzoom[.]us, hosted on infrastructure controlled via AS400897 (Petrosky Cloud LLC). The victim's browser loads a self-contained HTML page that renders a convincing fake Zoom meeting interface. As the page loads, the getUserMedia API silently captures the victim's webcam feed and exfiltrates it via HTTP POST to attacker infrastructure, where it is stored for use in future fake meetings targeting the victim's professional contacts.
Stage two delivers the payload via ClickFix. Eight seconds into the fake meeting, an overlay appears claiming the user's Zoom SDK is outdated and requires an update. The page silently replaces the clipboard contents with an obfuscated PowerShell command encoded in Base64 plus XOR key 0x43. The victim copies what looks like a diagnostic command and pastes it into the Windows Run dialog or terminal, triggering the download of a Stage 3 PowerShell payload to %TEMP%\chromechip.log.
Stage three establishes persistent C2. The PowerShell implant beacons to 83[.]136[.]208[.]246 on port 6783 every five seconds, sending a JSON profile of the compromised host including hostname, OS version, process list, and admin status. The malware performs VM detection by checking for virtualization process names before proceeding.
Stage four deploys six post-exploitation modules — browser credential stealer, Telegram session hijacker, screenshot capture, software inventory collector, UAC bypass DLL, and persistent startup LNK — within approximately two minutes of initial compromise.
Calendly Spearphishing — Typo-Squatted Zoom Link Delivered
BlueNoroff operator, posing as a fintech legal professional, sends a Calendly invite. When the victim confirms, the Google Meet link is quietly replaced with a typo-squatted Zoom domain (e.g. uu03webzoom[.]us). The victim's browser renders a convincing fake meeting interface; getUserMedia captures webcam footage and exfiltrates it to attacker infrastructure.
ClickFix Clipboard Injection — Obfuscated PowerShell Delivered
Eight seconds into the fake meeting, a ClickFix overlay claims the Zoom SDK needs updating. The page silently replaces the clipboard with a Base64+XOR 0x43 encoded PowerShell cradle. The victim pastes and runs it — downloading the Stage 3 C2 implant to %TEMP%\chromechip.log and displaying a fake success message.
Fileless C2 Implant — Persistent Beacon Established
The PowerShell implant beacons to 83[.]136[.]208[.]246:6783 every five seconds, profiling the host and awaiting tasking. A startup LNK ('Chrome Update – Certificated.lnk') and bootstrap payload (chrome-debug-data001.log) establish persistence across reboots.
Post-Exploitation — Six Modules Deployed in Under 2 Minutes
C2 tasking delivers browser credential stealer (Chrome/Edge/Brave), Telegram session hijacker, screenshot exfil via HTTP and Telegram Bot API, software inventory collector, and a COM-elevation UAC bypass DLL. All execution occurs in memory. Exfiltrated data is staged to %TEMP% and sent via curl to attacker infrastructure.
North Korea's AI-Powered Deepfake Pipeline: 950 Files, 100 Victims
The defining characteristic of the BlueNoroff fake Zoom attack is not the malware — it is the self-sustaining deepfake production pipeline that makes each attack more convincing than the last.
Arctic Wolf's analysis of the attacker's media hosting server recovered more than 950 files organized into eight directories. The operator, identified by the username 'king' embedded in Adobe Premiere Pro project metadata, runs a four-stage production workflow on a macOS host (Apple MacBookPro18,1) with a Windows 10 VMware virtual machine used for video capture.
Stage one generates AI portrait images. BlueNoroff uses ChatGPT's GPT-4o model to generate 1024x1024 PNG headshots of fictional meeting participants. Arctic Wolf confirmed eight AI-generated images on the server, with C2PA cryptographic manifests directly attributing them to OpenAI's infrastructure.
Stage two captures source video. The operator records themselves performing natural video call movements inside the Windows VM using Xbox Game DVR, then layers AI-generated faces over this footage using Adobe Premiere Pro 2021. Real victim webcam footage exfiltrated from prior compromises is also incorporated directly — 140 scraped videos and 185 webcam captures were recovered from the server.
The result is a three-type participant library: AI-generated still images, deepfake composite videos, and real stolen footage of actual identified individuals from prior attacks. At least 100 real people's images and videos were found on the server; nearly half are CEOs or co-founders. One publicly disclosed victim confirmed their Telegram account was subsequently used to send Calendly invites to their professional contacts, demonstrating the self-reinforcing cycle.
Peak campaign activity reached 121 events in March 2026, with operator activity consistently concentrated between 08:00 and 18:00 Korean Standard Time, Monday through Friday, consistent with a state-sponsored workforce on a regular schedule.
“The attacker had stolen images and videos of at least 100 individuals — nearly half of them CEOs or co-founders of their organizations — and was reusing that footage to populate even more convincing fake Zoom meetings to target new victims. This is a self-sustaining pipeline.”
Arctic Wolf Labs — BlueNoroff Fake Zoom Campaign Analysis, April 29, 2026
Which Cryptocurrency Executives Does BlueNoroff Target in 2026?
BlueNoroff's targeting in this campaign is deliberate, narrow, and focused on individuals with the highest-value access: direct control over cryptocurrency wallets, investment authority, and private keys.
Of the 100 confirmed victims identified from the attacker's media server, 54% work in cryptocurrency or blockchain finance, and 26% work in traditional finance and venture capital. A further 8% are in AI or technology, and 5% in fintech — giving a combined 93% in financially adjacent roles with either direct crypto holdings or decision-making authority over significant digital asset portfolios.
The seniority concentration is the most alarming data point. 45% of targets are CEOs or co-founders. A further 21% hold senior leadership titles, 10% are in the C-suite (COO, CFO, CSO), and 7% are investors or partners. Only 9% are individual contributors. BlueNoroff is not phishing the helpdesk — it is targeting the people with wallet authority and the institutional trust to authorize large transactions.
Geographically, 41% of confirmed targets are in the United States, 24% in East Asia (Singapore, Hong Kong, South Korea), and 21% in Europe. The geographic spread reflects the global distribution of institutional crypto capital and Web3 venture activity, not a regionally confined operation.
This targeting profile has direct implications for how organizations should prioritize defensive resources. Standard employee phishing training aimed at the general workforce is insufficient when the actual attack surface is the executive layer. Crypto-native organizations should assume their founders and C-suite have already been added to BlueNoroff's targeting list if they have any public LinkedIn or conference presence in the Web3 space.
BlueNoroff MITRE ATT&CK TTPs: ClickFix, Fileless PowerShell, and UAC Bypass
**BlueNoroff** (also tracked as APT38, Sapphire Sleet, and TA444) is a North Korean state-sponsored subgroup of Lazarus Group, the DPRK's primary cyber operations unit under the Reconnaissance General Bureau. The group has specialized in financial cybercrime since at least 2014, including the $81 million Bangladesh Bank SWIFT heist in 2016.
The fake Zoom campaign maps to a comprehensive set of MITRE ATT&CK techniques, with several high-confidence signatures that defenders can use for threat hunting.
Initial access uses T1566.002 (Spearphishing Link) via typo-squatted Zoom domains delivered through Calendly and calendar invite modification. Execution relies on T1059.001 (PowerShell) via ClickFix clipboard injection, using T1027 (Obfuscated Files and Information) with Base64 plus XOR 0x43 encoding across all payload stages.
Persistence is established via T1547.001 (Boot or Logon Autostart Execution: Registry Run Key), specifically a startup LNK named 'Chrome Update – Certificated.lnk' in the Windows Startup folder. Privilege escalation uses T1548.002 (Abuse Elevation Control Mechanism: Bypass UAC) via a COM elevation moniker targeting the IElevator interface.
Credential access is the campaign's primary objective. T1555.003 (Credentials from Password Managers: Browser Credentials) is executed by injecting a PE binary into chrome.exe, msedge.exe, and brave.exe processes, extracting the AES-256-GCM encrypted master key via the COM IElevator interface and decrypting saved login credentials. T1115 (Clipboard Data) captures the ClickFix payload substitution.
Command and control uses T1071.001 (Application Layer Protocol: HTTP/HTTPS) via HTTP POST to /api/daemon and /api/result endpoints, plus T1571 (Non-Standard Port) on ports 6783, 7365, and 8444. A secondary C2 channel via the Telegram Bot API (T1071) provides redundancy and screenshot exfiltration.
This technique combination — ClickFix delivery plus fileless PowerShell plus in-memory browser injection — is specifically designed to evade signature-based endpoint protection. The [ClickFix technique was also used in the Storm-1865 Booking.com campaign](/blog/booking-com-storm-1865-clickfix-reservation-breach), demonstrating that multiple nation-state actors have now adopted this initial access method. Organizations relying solely on antivirus without behavioral EDR telemetry will not detect this attack chain.
BlueNoroff Indicators of Compromise: Active Domains, IPs, and File Hashes
The following IOCs are confirmed active as of April 29, 2026. Block all C2 IPs at the network perimeter and all domains at the DNS layer. Hunt for file hashes and persistence artifacts on all endpoints in your environment, prioritizing executive workstations and devices in the cryptocurrency or finance sectors.
| Artifact | Type | SHA-256 (Truncated) |
|---|---|---|
| 83[.]136[.]208[.]246 | C2 IP (Port 6783) | Primary C2 beacon for PowerShell implant; also used for Telegram session data exfiltration. Block at perimeter firewall. |
| 83[.]136[.]209[.]22 | C2 IP (Port 8444) | AES-encrypted payload delivery and browser artifact exfiltration endpoint. Block at perimeter firewall. |
| 104[.]145[.]210[.]107 | Exfiltration IP (Port 8444) | Browser artifact and software inventory exfiltration. Block at perimeter firewall. |
| check02id[.]com | Exfiltration Domain (Port 7365) | Screenshot Method 1 upload endpoint. Block at DNS layer. |
| thriddata[.]com | Exfiltration Domain | Teams camera and media exfiltration endpoint via /upload path. Block at DNS layer. |
| uu03webzoom[.]us | Phishing Domain | Typo-squatted Zoom domain confirmed in the January 2026 intrusion. Block and alert on any DNS resolution. |
| teams-live[.]org / ms-live[.]com | Phishing Domains | Typo-squatted Teams domains used in parallel campaign variant. Block at DNS layer. |
| 17158cd6490a2b3c672d087f3d69107643d6a6f7c67345461b10ae18f27e28d1 | SHA-256 Hash | Stage A Donut-style shellcode loader (~1.26 MB position-independent x86) for browser process injection. Alert if detected on endpoint. |
| db446f0e1d18b43805bfefe1af934ae4b0879e376904635cc7e14eae2d7fc682 | SHA-256 Hash | Browser credential stealer PE64 (MSVC 2022) targeting Chrome, Edge, and Brave login databases via AES-256-GCM key extraction. |
| dd1c72823f933952619cbb86aaeaea43057a259e9a0c9e3b11c82225ec3faaa1 | SHA-256 Hash | comBypassUacDLL.x64.dll — UAC bypass via COM elevation moniker (Elevation:Administrator!new). Critical persistence and privilege escalation component. |
Any instance of msimg32.dll found outside C:\Windows\System32 is an active IOC. Isolate the host immediately. Full hashes and IOC lists are available via the Cisco Talos GitHub repository.
How to Detect BlueNoroff Fileless PowerShell in Your Environment
Detecting the BlueNoroff deepfake Zoom attack requires behavioral EDR telemetry — signature-based antivirus will not fire because all malicious execution happens in memory, with legitimate file extensions (.log) used to mask payloads.
The highest-confidence single detection signal is a child process spawned from powershell.exe with -WindowStyle Hidden arguments, particularly when csc.exe (C# compiler) is invoked via Add-Type. BlueNoroff compiles browser injection helpers at runtime using Add-Type, which is unusual behavior in a production environment and rarely legitimate in user sessions.
For browser credential theft, hunt for non-browser processes opening Chrome's Login Data or Local State SQLite databases. Legitimate applications do not read these files. Any process other than chrome.exe, msedge.exe, or brave.exe reading %LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data should trigger an immediate alert. Similarly, flag non-browser processes calling BCryptSetProperty with 'ChainingModeGCM' or BCryptDecrypt — the AES-256-GCM decryption path used to access the Chrome app-bound encryption key.
Persistence artifacts are highly specific: alert on any LNK file created in %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ with names containing 'Chrome Update' or 'Certificated'. Monitor for creation of .log files in %TEMP% with naming patterns matching chromechip.log, and for %USERPROFILE%\chrome-debug-data001.log.
Network-based detection should alert on outbound HTTP POST connections to port 6783 (non-standard), connections to check02id[.]com or thriddata[.]com, and any requests to the Telegram Bot API from non-user-initiated contexts. The Telegram bot token 8446140951:AAExeAepUZQAegP0A9IQbp__JB4xDaq4ohc is a high-confidence attribution indicator if seen in network logs.
For web proxy and DNS, alert on resolution of any subdomain matching the pattern [2 chars][2 digits]web[meeting-brand][.][us|com|org] — BlueNoroff's typo-squatting domain naming convention. This pattern matches uu03webzoom[.]us, zoom[.]ue01web[.]us, and similar variants without requiring an explicit block list.
North Korean cyber operations, including related [North Korea supply chain attacks targeting developer tooling](/blog/north-korea-supply-chain-1700-packages), consistently leverage the same hosting infrastructure. Threat hunting across all Petrosky Cloud LLC (AS400897) IP ranges may surface additional BlueNoroff infrastructure.
Immediate Defensive Steps for Web3 and Crypto Organizations
The BlueNoroff deepfake Zoom attack has no patch because it exploits human behavior and in-memory execution rather than a patched software vulnerability. Defense requires a combination of technical controls, policy changes, and targeted awareness training for the specific executive population that BlueNoroff is actively hunting.
Block all confirmed C2 IPs and typo-squatted domains at the network perimeter now
Add 83.136.208.246, 83.136.209.22, and 104.145.210.107 to your firewall deny list. Add check02id[.]com, thriddata[.]com, uu03webzoom[.]us, teams-live[.]org, and ms-live[.]com to your DNS blocklist. While BlueNoroff rotates infrastructure, blocking known indicators disrupts active operations immediately.
Enable PowerShell Script Block Logging on all endpoints today
Enable PowerShell Operational logging (Event ID 4104) and Script Block Logging via Group Policy. This logs the decoded content of all PowerShell commands at execution time, capturing Base64+XOR obfuscated payloads after they are decoded. Without this, BlueNoroff's initial access stage is invisible to most SIEM configurations.
Restrict browser getUserMedia API to known legitimate conferencing domains
Deploy a browser policy restricting webcam and microphone access to zoom.us, teams.microsoft.com, and meet.google.com. This prevents BlueNoroff's fake meeting page from silently capturing and exfiltrating victims' webcam footage, breaking the self-reinforcing pipeline. Chrome and Edge support this via enterprise policy (VideoCaptureAllowedUrls).
Train executives to verify all external meeting links via secondary channel
Publish a policy for all C-suite and senior staff: verify any external meeting invitation by calling the organizer on a known number before clicking any meeting link. Legitimate meeting platforms never prompt users to run terminal commands to fix audio or camera issues. Simulate this attack pattern against your executive population quarterly.
Deploy EDR behavioral analytics targeting process injection and fileless PowerShell
Ensure your EDR is configured to alert on: non-browser processes calling OpenProcess and WriteProcessMemory targeting chrome.exe; csc.exe invoked from powershell.exe via Add-Type; and powershell.exe child processes with -WindowStyle Hidden -ExecutionPolicy Bypass arguments. These three signals together represent the BlueNoroff browser injection chain.
Hunt for persistence artifacts on executive workstations immediately
Run an immediate hunt across executive devices for: %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Chrome Update*.lnk; %TEMP%\chromechip.log; %USERPROFILE%\chrome-debug-data001.log; and the file hashes db446f0e1d18b43805bfefe1af934ae4b0879e376904635cc7e14eae2d7fc682 (credential stealer) and dd1c72823f933952619cbb86aaeaea43057a259e9a0c9e3b11c82225ec3faaa1 (UAC bypass DLL).
Rotate all credentials and revoke Telegram sessions on any compromised device
If any IOC matches, assume full browser credential compromise. Immediately revoke all browser-stored passwords, API keys, SSH keys, and cryptocurrency wallet credentials. In Telegram Settings, terminate all active sessions not on the primary device. Enable Telegram two-step verification. Assume any Calendly invite or meeting link sent from the compromised account's Telegram or email has been weaponized against the victim's contacts.
The bottom line
The BlueNoroff deepfake Zoom attack represents a fundamental shift in nation-state social engineering: AI-generated participants make video call verification unreliable, fileless execution defeats signature-based AV, and each new victim feeds a self-sustaining lure pipeline targeting their own professional network. Three actions matter most right now: block the confirmed C2 IPs and typo-squatted domains at your perimeter, enable PowerShell Script Block Logging on all executive endpoints, and train your C-suite that terminal command prompts during video calls are always malicious. Run the persistence hunt against executive workstations before end of business today.
Frequently asked questions
What is BlueNoroff?
BlueNoroff is a North Korean state-sponsored threat actor operating under the Lazarus Group umbrella, attributed to the DPRK's Reconnaissance General Bureau. The group specializes in financially motivated attacks against cryptocurrency exchanges, Web3 startups, and fintech firms, using social engineering, fileless malware, and deepfake technology to steal digital assets. BlueNoroff has been responsible for hundreds of millions of dollars in cryptocurrency theft since at least 2014.
How does the BlueNoroff fake Zoom attack work?
BlueNoroff sends a Calendly invite posing as a legal professional, then swaps the Google Meet link for a typo-squatted Zoom URL before the call. Victims join a convincing fake meeting populated with AI-generated avatars or stolen video footage from prior victims. A ClickFix overlay prompts a fake SDK update, injecting an obfuscated PowerShell command into the victim's clipboard. When the victim runs it, four malware modules deploy in under five minutes: a C2 implant, browser credential stealer, Telegram session hijacker, and UAC bypass.
Who does BlueNoroff target in this campaign?
BlueNoroff is targeting cryptocurrency and Web3 executives in this campaign. Of 100 confirmed victims across 20 countries, 80% work directly in cryptocurrency, blockchain finance, or adjacent investment sectors. 45% are CEOs or co-founders — individuals with direct access to crypto wallets and private keys. The United States accounts for 41% of targets, followed by East Asia (24%) and Europe (21%).
Is there a patch for the BlueNoroff Zoom attack?
There is no software patch because this attack exploits human behavior, not a software vulnerability. BlueNoroff uses social engineering and typo-squatted domains rather than a CVE. The effective defense is procedural: verify all meeting URLs through a secondary channel before joining, enable PowerShell Script Block Logging to detect obfuscated commands, restrict browser getUserMedia API access to known-good conferencing domains, and train staff to recognize ClickFix-style prompts asking them to run terminal commands.
How do I detect BlueNoroff activity in my environment?
Hunt for these signals: PowerShell with Base64 decode combined with XOR 0x43 patterns; child processes of powershell.exe spawning cmd.exe or csc.exe; non-browser processes reading Chrome Login Data or Local State files; creation of %TEMP%\chromechip.log or %USERPROFILE%\chrome-debug-data001.log; LNK files in %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ named 'Chrome Update'; and outbound connections to 83.136.208.246 port 6783 or the check02id.com domain.
How do I protect my organization from BlueNoroff?
Seven immediate steps: block the known C2 IPs (83.136.208.246, 83.136.209.22, 104.145.210.107) and typo-squatted domains at your DNS and firewall; enable PowerShell Script Block Logging on all endpoints; restrict getUserMedia API to zoom.us and teams.microsoft.com in browser policy; train staff that legitimate meeting platforms never ask users to run terminal commands to fix audio or camera issues; deploy EDR behavioral analytics for fileless PowerShell; rotate all credentials immediately if any IOC is found; and verify all external meeting invites through a secondary out-of-band channel.
What malware does BlueNoroff deploy in the fake Zoom attack?
BlueNoroff deploys six modules post-compromise. The PowerShell C2 implant (chromechip.log) beacons to attacker infrastructure every five seconds. The browser credential stealer extracts saved passwords from Chrome, Edge, and Brave using AES-256-GCM decryption. The Telegram session stealer copies Telegram's tdata folder and key material. A UAC bypass DLL uses COM elevation to achieve admin privileges. Two screenshot capture modules exfiltrate desktop images via HTTP and the Telegram Bot API. All execution is fileless in memory, evading signature-based antivirus.
Has BlueNoroff been sanctioned or indicted?
The US Department of the Treasury's OFAC sanctioned Lazarus Group (BlueNoroff's parent) in September 2019, designating it as a Specially Designated National. The US Department of Justice has indicted specific North Korean nationals linked to Lazarus Group operations. Despite these sanctions, BlueNoroff continues to operate with full DPRK state backing, and the sanctions have not materially disrupted the group's cryptocurrency theft campaigns.
Sources & references
- Arctic Wolf — BlueNoroff Uses ClickFix, Fileless PowerShell, and AI-Generated Fake Zoom Meetings to Target Web3 Sector
- GBHackers — BlueNoroff Deploys Fileless PowerShell in AI-Generated Zoom Lure Campaign
- The Hacker News — BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with macOS Backdoor Malware
- Rewterz — BlueNoroff Deepfake Zoom Call Deploys macOS Malware: Active IOCs
- MITRE ATT&CK — BlueNoroff Group Profile
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
