Manta Network Co-Founder Foils Lazarus Group Phishing Attack, Warns of New Scam Tactics

Kenny Li, co-founder of Manta Network, recently foiled a sophisticated phishing attack via Zoom, believed to be orchestrated by the notorious North Korean hacking group, Lazarus.

The attack appeared legitimate, with familiar faces and cameras on. However, Li noticed something odd – there was no audio. The attackers then prompted him to update Zoom by downloading a script, raising his suspicions.

A Convincing Setup

Li described the videocall as “too real to be trusted.” The videos didn’t seem AI-generated; they looked like genuine webcam footage, possibly from previous meetings. This level of detail made the attack particularly convincing.

The attackers had apparently compromised at least one of the impersonated accounts, adding to the authenticity. When Li suggested switching to Google Meet, the attacker hesitated before deleting all messages and blocking him.

A Growing Threat

This incident highlights a new wave of phishing attacks targeting the crypto ecosystem. They’re no longer just simple scams; they’re complex, audiovisual setups that exploit trust and work routines.

Other community members have reported similar attempts, where they’re asked to download a supposed “business version” of Zoom from external links. One user from ContributionDAO was asked to download another version despite having Zoom installed.

Staying Vigilant

Li’s experience serves as a warning to founders and developers who receive multiple meeting requests daily. His advice? Be cautious of downloadable files and never act under pressure.

To avoid falling prey to these scams, it’s crucial to:

  • Verify identities through multiple channels
  • Be wary of unsolicited meeting requests
  • Never download files or software from unverified sources

The key to cybersecurity lies not just in technology, but also in recognizing anomalies and being mindful of emotional manipulation.

Recent Articles

Related News

Leave A Reply

Please enter your comment!
Please enter your name here