{"id":17050,"date":"2026-01-27T02:24:08","date_gmt":"2026-01-27T02:24:08","guid":{"rendered":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/"},"modified":"2026-01-27T02:24:08","modified_gmt":"2026-01-27T02:24:08","slug":"north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers","status":"publish","type":"post","link":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/","title":{"rendered":"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers"},"content":{"rendered":"<h2>Pag-atake ng mga Hacker na Konektado sa North Korea<\/h2>\n<p>Ang mga hacker na may kaugnayan sa <strong>North Korea<\/strong> ay patuloy na gumagamit ng <strong>live video calls<\/strong>, kabilang ang mga <em>AI-generated deepfakes<\/em>, upang lokohin ang mga developer at manggagawa ng cryptocurrency na mag-install ng nakakahamak na software sa kanilang mga device.<\/p>\n<h2>Insidente ng Malware<\/h2>\n<p>Sa pinakabagong insidente na ibinunyag ng co-founder ng BTC Prague na si <strong>Martin Kucha\u0159<\/strong>, ginamit ng mga umaatake ang isang nakompromisong <strong>Telegram account<\/strong> at isang staged video call upang ipakalat ang <strong>malware<\/strong> na nakatago bilang isang <em>Zoom audio fix<\/em>. Ayon kay Kucha\u0159, ang &#8220;<strong>high-level hacking campaign<\/strong>&#8221; ay tila &#8220;<em>nakatutok sa mga gumagamit ng Bitcoin at cryptocurrency<\/em>.&#8221;<\/p>\n<h2>Paraan ng Atake<\/h2>\n<p>Nakikipag-ugnayan ang mga umaatake sa biktima at nag-set up ng <strong>Zoom<\/strong> o <strong>Teams call<\/strong>. Sa panahon ng tawag, gumagamit sila ng <em>AI-generated video<\/em> upang magmukhang isang tao na kilala ng biktima. Pagkatapos, sinasabi nila na may problema sa audio at hinihiling sa biktima na mag-install ng plugin o file upang ayusin ito. Kapag na-install na, ang malware ay nagbibigay sa mga umaatake ng buong access sa sistema, na nagpapahintulot sa kanila na magnakaw ng <strong>Bitcoin<\/strong>, sakupin ang mga <strong>Telegram account<\/strong>, at gamitin ang mga account na iyon upang targetin ang iba.<\/p>\n<h2>Pagtaas ng mga Scam na Pinapagana ng AI<\/h2>\n<p>Ito ay naganap habang ang mga scam na pinapagana ng AI ay nagdala ng mga pagkalugi na may kaugnayan sa cryptocurrency sa isang rekord na <strong>$17 bilyon<\/strong> noong 2025, kung saan ang mga umaatake ay lalong gumagamit ng <em>deepfake video<\/em>, <em>voice cloning<\/em>, at pekeng pagkakakilanlan upang lokohin ang mga biktima at makakuha ng access sa mga pondo, ayon sa datos mula sa blockchain analytics firm na <strong>Chainalysis<\/strong>.<\/p>\n<h2>Teknik ng mga Umaatake<\/h2>\n<p>Ang atake, ayon kay Kucha\u0159, ay malapit na tumutugma sa isang teknik na unang naitala ng cybersecurity company na <strong>Huntress<\/strong>, na nag-ulat noong Hulyo ng nakaraang taon na ang mga umaatake na ito ay umaakit ng isang target na manggagawa sa cryptocurrency sa isang staged Zoom call pagkatapos ng paunang pakikipag-ugnayan sa Telegram, kadalasang gumagamit ng pekeng meeting link na naka-host sa isang spoofed Zoom domain.<\/p>\n<h2>Malware Chain at mga Target<\/h2>\n<p>Sa panahon ng tawag, ang mga umaatake ay mag-aangkin na may problema sa audio at mag-uutos sa biktima na mag-install ng tila Zoom-related fix, na sa katunayan ay isang nakakahamak na <em>AppleScript<\/em> na nag-uumpisa ng multi-stage macOS infection. Kapag na-execute, ang script ay nag-disable ng shell history, nagche-check para sa o nag-iinstall ng <strong>Rosetta 2<\/strong> (isang translation layer) sa mga Apple Silicon device, at paulit-ulit na hinihiling ang user para sa kanilang system password upang makakuha ng elevated privileges.<\/p>\n<h2>Advanced Persistent Threat<\/h2>\n<p>Natutuklasan ng pag-aaral na ang malware chain ay nag-iinstall ng maraming payloads, kabilang ang persistent backdoors, keylogging at clipboard tools, at crypto wallet stealers, isang katulad na pagkakasunod-sunod na itinuro ni Kucha\u0159 nang ibinunyag niya noong Lunes na ang kanyang Telegram account ay nakompromiso at kalaunan ay ginamit upang targetin ang iba sa parehong paraan.<\/p>\n<h2>Koneksyon sa Lazarus Group<\/h2>\n<p>Ang mga security researchers sa Huntress ay may mataas na kumpiyansa na iniuugnay ang pagpasok na ito sa isang <strong>advanced persistent threat<\/strong> na may kaugnayan sa North Korea na tinutukoy bilang <strong>TA444<\/strong>, na kilala rin bilang <strong>BlueNoroff<\/strong> at sa iba pang mga alias na nagpapatakbo sa ilalim ng umbrella term na <strong>Lazarus Group<\/strong>, isang state-sponsored group na nakatuon sa pagnanakaw ng cryptocurrency mula pa noong 2017.<\/p>\n<h2>Mga Opinyon ng mga Eksperto<\/h2>\n<blockquote>\n<p>Nang tanungin tungkol sa mga operational goals ng mga kampanyang ito at kung sa tingin nila ay may kaugnayan, sinabi ni <strong>Sh\u0101n Zhang<\/strong>, chief information security officer ng blockchain security firm na <strong>Slowmist<\/strong>, sa Decrypt na ang pinakabagong atake kay Kucha\u0159 ay &#8220;posibleng&#8221; konektado sa mas malawak na mga kampanya mula sa Lazarus Group.<\/p>\n<\/blockquote>\n<blockquote>\n<p>&#8220;May malinaw na muling paggamit sa mga kampanya. Patuloy naming nakikita ang pagtutok sa mga tiyak na wallet at ang paggamit ng napaka-katulad na install scripts,&#8221; sinabi ni <strong>David Liberman<\/strong>, co-creator ng decentralized AI compute network na <strong>Gonka<\/strong>, sa Decrypt.<\/p>\n<\/blockquote>\n<blockquote>\n<p>&#8220;Ang mga imahe at video ay &#8216;di na maaaring ituring na maaasahang patunay ng pagiging tunay,&#8221; sabi ni Liberman, na idinagdag na ang digital content &#8220;dapat ay cryptographically signed ng kanyang creator, at ang mga ganitong pirma ay dapat mangailangan ng multi-factor authorization.&#8221;<\/p>\n<\/blockquote>\n<blockquote>\n<p>Ang mga naratibo, sa mga konteksto tulad nito, ay naging &#8220;isang mahalagang signal upang subaybayan at matukoy&#8221; dahil sa kung paano ang mga atake na ito &#8220;ay umaasa sa pamilyar na mga pattern ng lipunan,&#8221; sabi niya.<\/p>\n<\/blockquote>\n<p>Ang <strong>Lazarus Group<\/strong> ng North Korea ay konektado sa mga kampanya laban sa mga kumpanya ng cryptocurrency, mga manggagawa, at mga developer, gamit ang mga nakalaang malware at sopistikadong social engineering upang magnakaw ng mga digital na asset at mga kredensyal sa pag-access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pag-atake ng mga Hacker na Konektado sa North Korea Ang mga hacker na may kaugnayan sa North Korea ay patuloy na gumagamit ng live video calls, kabilang ang mga AI-generated deepfakes, upang lokohin ang mga developer at &#8230;<\/p>\n","protected":false},"author":3,"featured_media":17049,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[42,47],"tags":[4225,4307,4313,4392,4391,4395,4315,10056],"class_list":["post-17050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bitcoin","category-hack","tag-bitcoin","tag-chainalysis","tag-hack","tag-lazarus","tag-north-korea","tag-slowmist","tag-telegram","tag-zoom"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers - CryptoZen<\/title>\n<meta name=\"description\" content=\"Ang mga hacker na may kaugnayan sa North Korea ay gumagamit ng deepfake video calls upang lokohin ang mga manggagawa ng cryptocurrency na mag-install ng malware, na nagta-target sa mga digital na asset at pribadong account.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers - CryptoZen\" \/>\n<meta property=\"og:description\" content=\"Ang mga hacker na may kaugnayan sa North Korea ay gumagamit ng deepfake video calls upang lokohin ang mga manggagawa ng cryptocurrency na mag-install ng malware, na nagta-target sa mga digital na asset at pribadong account.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/\" \/>\n<meta property=\"og:site_name\" content=\"CryptoZen\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-27T02:24:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/215c42a44c778a4d41cede868d63707c\"},\"headline\":\"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers\",\"datePublished\":\"2026-01-27T02:24:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/\"},\"wordCount\":791,\"publisher\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/#organization\"},\"image\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg\",\"keywords\":[\"Bitcoin\",\"Chainalysis\",\"Hack\",\"Lazarus\",\"North Korea\",\"SlowMist\",\"Telegram\",\"Zoom\"],\"articleSection\":[\"Bitcoin\",\"Hack\"],\"inLanguage\":\"tl\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/\",\"url\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/\",\"name\":\"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers - CryptoZen\",\"isPartOf\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg\",\"datePublished\":\"2026-01-27T02:24:08+00:00\",\"description\":\"Ang mga hacker na may kaugnayan sa North Korea ay gumagamit ng deepfake video calls upang lokohin ang mga manggagawa ng cryptocurrency na mag-install ng malware, na nagta-target sa mga digital na asset at pribadong account.\",\"breadcrumb\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#breadcrumb\"},\"inLanguage\":\"tl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tl\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#primaryimage\",\"url\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg\",\"contentUrl\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cryptozen.asia\/ph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#website\",\"url\":\"https:\/\/cryptozen.asia\/ph\/\",\"name\":\"CryptoZen\",\"description\":\"Nangungunang Balita sa Cryptocurrency na Pinalakas ng AI\",\"publisher\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/#organization\"},\"alternateName\":\"CZ\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cryptozen.asia\/ph\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#organization\",\"name\":\"CryptoZen\",\"alternateName\":\"CZ\",\"url\":\"https:\/\/cryptozen.asia\/ph\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tl\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2025\/05\/azen_preview2-1.png\",\"contentUrl\":\"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2025\/05\/azen_preview2-1.png\",\"width\":600,\"height\":600,\"caption\":\"CryptoZen\"},\"image\":{\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/215c42a44c778a4d41cede868d63707c\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tl\",\"@id\":\"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bfd406270e6dbea874497e5c3a864e82?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bfd406270e6dbea874497e5c3a864e82?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\/\/cryptozen.asia\/ph\/author\/editorapi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers - CryptoZen","description":"Ang mga hacker na may kaugnayan sa North Korea ay gumagamit ng deepfake video calls upang lokohin ang mga manggagawa ng cryptocurrency na mag-install ng malware, na nagta-target sa mga digital na asset at pribadong account.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/","og_locale":"en_US","og_type":"article","og_title":"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers - CryptoZen","og_description":"Ang mga hacker na may kaugnayan sa North Korea ay gumagamit ng deepfake video calls upang lokohin ang mga manggagawa ng cryptocurrency na mag-install ng malware, na nagta-target sa mga digital na asset at pribadong account.","og_url":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/","og_site_name":"CryptoZen","article_published_time":"2026-01-27T02:24:08+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg","type":"image\/jpeg"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"4 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#article","isPartOf":{"@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/"},"author":{"name":"Editor","@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/215c42a44c778a4d41cede868d63707c"},"headline":"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers","datePublished":"2026-01-27T02:24:08+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/"},"wordCount":791,"publisher":{"@id":"https:\/\/cryptozen.asia\/ph\/#organization"},"image":{"@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg","keywords":["Bitcoin","Chainalysis","Hack","Lazarus","North Korea","SlowMist","Telegram","Zoom"],"articleSection":["Bitcoin","Hack"],"inLanguage":"tl"},{"@type":"WebPage","@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/","url":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/","name":"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers - CryptoZen","isPartOf":{"@id":"https:\/\/cryptozen.asia\/ph\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#primaryimage"},"image":{"@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg","datePublished":"2026-01-27T02:24:08+00:00","description":"Ang mga hacker na may kaugnayan sa North Korea ay gumagamit ng deepfake video calls upang lokohin ang mga manggagawa ng cryptocurrency na mag-install ng malware, na nagta-target sa mga digital na asset at pribadong account.","breadcrumb":{"@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#breadcrumb"},"inLanguage":"tl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/"]}]},{"@type":"ImageObject","inLanguage":"tl","@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#primaryimage","url":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg","contentUrl":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2026\/01\/story_156225_preview.jpeg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/cryptozen.asia\/ph\/north-korea-linked-hackers-use-deepfake-video-calls-to-target-crypto-workers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cryptozen.asia\/ph\/"},{"@type":"ListItem","position":2,"name":"North Korea\u2013Linked Hackers Use Deepfake Video Calls to Target Crypto Workers"}]},{"@type":"WebSite","@id":"https:\/\/cryptozen.asia\/ph\/#website","url":"https:\/\/cryptozen.asia\/ph\/","name":"CryptoZen","description":"Nangungunang Balita sa Cryptocurrency na Pinalakas ng AI","publisher":{"@id":"https:\/\/cryptozen.asia\/ph\/#organization"},"alternateName":"CZ","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cryptozen.asia\/ph\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tl"},{"@type":"Organization","@id":"https:\/\/cryptozen.asia\/ph\/#organization","name":"CryptoZen","alternateName":"CZ","url":"https:\/\/cryptozen.asia\/ph\/","logo":{"@type":"ImageObject","inLanguage":"tl","@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/logo\/image\/","url":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2025\/05\/azen_preview2-1.png","contentUrl":"https:\/\/cryptozen.asia\/ph\/wp-content\/uploads\/sites\/25\/2025\/05\/azen_preview2-1.png","width":600,"height":600,"caption":"CryptoZen"},"image":{"@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/215c42a44c778a4d41cede868d63707c","name":"Editor","image":{"@type":"ImageObject","inLanguage":"tl","@id":"https:\/\/cryptozen.asia\/ph\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bfd406270e6dbea874497e5c3a864e82?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfd406270e6dbea874497e5c3a864e82?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/cryptozen.asia\/ph\/author\/editorapi\/"}]}},"yoast_description":"Ang mga hacker na may kaugnayan sa North Korea ay gumagamit ng deepfake video calls upang lokohin ang mga manggagawa ng cryptocurrency na mag-install ng malware, na nagta-target sa mga digital na asset at pribadong account.","_links":{"self":[{"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/posts\/17050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/comments?post=17050"}],"version-history":[{"count":0,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/posts\/17050\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/media\/17049"}],"wp:attachment":[{"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/media?parent=17050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/categories?post=17050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptozen.asia\/ph\/wp-json\/wp\/v2\/tags?post=17050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}