Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Actively Exploiting Critical NGIN NGINX Vulnerability
May 18, 2026
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Home/Threats/UNC1069 Hackers Attacking Finance Sector with New Tools and
Threats

UNC1069 Hackers Attacking Finance Sector with New Tools and

Tracked as UNC1069, North Korean threat actors have significantly intensified their attacks on the cryptocurrency and finance sectors. Their latest campaigns leverage a sophisticated arsenal,...

Sarah simpson
Sarah simpson
February 10, 2026 2 Min Read
6 0

Tracked as UNC1069, North Korean threat actors have significantly intensified their attacks on the cryptocurrency and finance sectors. Their latest campaigns leverage a sophisticated arsenal, deploying novel malware alongside artificial intelligence capabilities.

Active since at least 2018, this financially motivated group continues to evolve its tradecraft, shifting from standard phishing attempts to highly tailored intrusions targeting software developers and venture capital firms.

Their latest campaign demonstrates a significant expansion in capabilities, focusing on harvesting credentials, session tokens, and browser data to facilitate financial theft.

The attackers typically initiate contact through professional social messaging platforms like Telegram, posing as legitimate recruiters or executives to build a strong rapport with potential victims.

After establishing trust, they steer targets toward a scheduled conference call using a spoofed meeting link.

To enhance the deception, they utilize AI-generated deepfake videos of company CEOs during these calls, creating a convincing ruse that disarms the victim and prepares them for the technical compromise.

Google Cloud analysts identified the malware families and the group’s transition to these AI-enabled lures after observing an unusually large volume of malicious tools deployed on victim hosts.

The researchers noted that UNC1069 now utilizes a diverse arsenal of seven distinct malware families, including custom backdoors and specialized browser extensions.

This aggressive tooling strategy indicates a determined effort to bypass security measures, secure persistent access, and extract as much sensitive information as possible from compromised systems before they are detected.

The impact of these intrusions is severe, as the attackers aim to drain cryptocurrency wallets and steal identity data to fuel future social engineering campaigns.

By deploying multiple layers of malicious software, they ensure that even if one tool is removed, others remain active to maintain control over the network. This persistence allows them to monitor victim activity over extended periods.

The ClickFix Infection Mechanism

The primary method for initially breaching victim systems in this campaign involves a deceptive social engineering technique known as “ClickFix.”

During the fraudulent Zoom meeting, the attackers simulate a technical audio issue and urgently direct the user to a malicious website for troubleshooting.

This site presents specific “fix” commands that the victim is tricked into running on their device to supposedly resolve the glitch.

Attack chain (Source - Google Cloud)
Attack chain (Source – Google Cloud)

The user is instructed to copy and execute a terminal command that covertly downloads and launches the initial malware payload.

This action cleverly bypasses standard security checks because the user manually authorizes the process. Once this command is executed, it deploys a backdoor named WAVESHAPER or a downloader like SUGARLOADER.

These programs immediately establish a connection with the attacker’s command-and-control server, effectively completing the infection chain and granting the hackers a firm foothold to deploy further data-mining tools such as CHROMEPUSH or DEEPBREATH.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachHackerMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Attackers Use Windows Shortcut Files to Deliver Global

Next Post

VoidLink Linux C2: LLM Malware Uses Multi Highlights LLM-Generated

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us