💥 HBAR price nears breakout as inverse head and shoulders pattern forms
HBAR price is consolidating below key resistance as an inverse head and shoulders pattern develops, signaling a potential bullish breakout if the neckline resistance is cleared with volume.
HBAR ($HBAR ) price action is showing increasingly constructive behavior as the market builds a classic bullish reversal structure on the higher timeframes. After an extended corrective phase, price has stabilized and begun forming an inverse head and shoulders pattern, a formation often associated with trend reversals when confirmed
Through deepfake video calls: how North Korean hackers are attacking crypto professionals
Hackers operating under North Korean guidance are expanding their arsenal of attack methods targeting crypto industry professionals. A new approach—using video calls with AI-generated deepfakes—allows malicious actors to impersonate acquaintances or authoritative contacts, then persuade victims to install malicious software. This method demonstrates how sophisticated the application of synthesis technologies has become for cyberattacks.
Video Calls as a Social Engineering Tool
According to research firm Huntress, the attack scenario unfolds as follows: attackers hijack real people’s Telegram accounts known to the target. They then initiate video calls during which the attacker’s face is replaced with an AI-generated deepfake. This bypasses basic visual verification checks that typically help identify fraud.
Martin Kuhar, co-organizer of the BTC Prague conference, shared details of a specific method: a deceptive video call is accompanied by a proposal to install a supposedly fix plugin for Zoom, claimed to resolve sound issues. After installing the malware, attackers gain full access to the infected device and can steal crypto assets, communications, and other critical data.
Technical Analysis of the Malware: Multi-layered Infection
The deployed malware demonstrates complexity and multifunctionality. On macOS systems, malicious code is capable of:
This functionality allows hackers not only to compromise a specific device but also to use it as a foothold for further operations.
Lazarus Group and State Support
Researchers from SlowMist and Huntress confidently identified the attackers as North Korea’s Lazarus Group, also known as BlueNoroff. The group receives funding and political backing from the state, enabling it to continually improve its hacking techniques.
A characteristic feature is the reuse of code components and attack techniques across multiple operations. This indicates centralized management and a long-term strategy targeting crypto professionals and traders.
How to Protect Yourself from Deepfake Video Call Attacks
The proliferation of face and voice synthesis technologies makes video and audio unreliable methods of authentication. Industries need to urgently rethink their identity verification approaches. Recommendations include:
The crypto industry must recognize the scale of the threat and take active measures to strengthen its defenses.