{"id":424446,"date":"2026-04-15T13:53:41","date_gmt":"2026-04-15T08:23:41","guid":{"rendered":"https:\/\/dripp.zone\/news\/north-korea-used-ai-to-hack-zerion-in-second-crypto-attack-crypto-news\/"},"modified":"2026-04-15T15:18:40","modified_gmt":"2026-04-15T09:48:40","slug":"north-korea-used-ai-to-hack-zerion-in-second-crypto-attack-crypto-news","status":"publish","type":"post","link":"https:\/\/dripp.zone\/news\/north-korea-used-ai-to-hack-zerion-in-second-crypto-attack-crypto-news\/","title":{"rendered":"North Korea Used AI to Hack Zerion in Second Crypto Attack &#8211; Crypto News"},"content":{"rendered":"<p><\/p>\n<div data-testid=\"html-renderer-container\">\n<p>Crypto wallet Zerion revealed that North Korean-affiliated hackers used AI in a long-term social engineering attack to steal about $100,000 from the company\u2019s hot wallets last week.\u00a0<\/p>\n<p>The Zerion team <a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/x.com\/zerion\/status\/2044167535231414727\" href=\"https:\/\/x.com\/zerion\/status\/2044167535231414727\" target=\"_blank\" rel=\"nofollow noopener\">released<\/a> a post-mortem on Wednesday, where it confirmed that no user funds, Zerion apps or infrastructure were affected and that it had proactively disabled the web app as a precaution.\u00a0<\/p>\n<p>While the amount was relatively small in crypto hacking terms, it is another incident of a crypto worker being targeted for an \u201cAI-enabled social engineering attack linked to a DPRK threat actor,\u201d Zerion said.<\/p>\n<p>It is the second attack of this nature this month, following the <a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/cointelegraph.com\/news\/drift-protocol-exploit-preparation-preliminary-findings\" href=\"https:\/\/cointelegraph.com\/news\/drift-protocol-exploit-preparation-preliminary-findings\">$280 million exploit<\/a> of the Drift Protocol, which was the victim of a \u201cstructured intelligence operation\u201d by DPRK-affiliated hackers. The human layer, not smart contract bugs, has now become North Korea\u2019s primary point of entry into crypto firms.\u00a0\u00a0<\/p>\n<h2>AI is changing the way cyber threats work<\/h2>\n<p>Zerion said the attacker gained access to some team members\u2019 logged-in sessions and <a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/cointelegraph.com\/news\/ai-agent-openclaw-security-risk-certik\" href=\"https:\/\/cointelegraph.com\/news\/ai-agent-openclaw-security-risk-certik\">credentials<\/a>, as well as <a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/cointelegraph.com\/explained\/uk-bitcoin-theft-seed-phrase-leak\" href=\"https:\/\/cointelegraph.com\/explained\/uk-bitcoin-theft-seed-phrase-leak\">private keys<\/a> to company hot wallets.\u00a0<\/p>\n<p>\u201cThis incident showed that AI is changing the way cyber threats work,\u201d the company said.\u00a0<\/p>\n<p>It confirmed that the attack was similar to those that had been investigated by the Security Alliance (SEAL) last week.<\/p>\n<p><em><strong>Related: <\/strong><\/em><a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/cointelegraph.com\/news\/researchers-discover-malicious-ai-agent-routers-that-can-steal-crypto\" href=\"https:\/\/cointelegraph.com\/news\/researchers-discover-malicious-ai-agent-routers-that-can-steal-crypto\"><em><strong>Researchers discover malicious AI agent routers that can steal crypto<\/strong><\/em><\/a><\/p>\n<p>SEAL <a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/radar.securityalliance.org\/advisory-on-dprk-unc1069-fake-microsoft-teams-and-zoom-calls\/\" href=\"https:\/\/radar.securityalliance.org\/advisory-on-dprk-unc1069-fake-microsoft-teams-and-zoom-calls\/\" target=\"_blank\" rel=\"nofollow noopener\">reported<\/a> that it had tracked and blocked 164 domains linked to the DPRK group UNC1069 in a two-month window from February to April.<\/p>\n<p>It stated that the group operates \u201cmultiweek, low-pressure social engineering campaigns\u201d across Telegram, LinkedIn and Slack. Malicious actors impersonate known contacts or credible brands or leverage access to previously compromised company and individual accounts.<\/p>\n<blockquote><p>\u201cUNC1069\u2019s social engineering methodology is defined by patience, precision, and the deliberate weaponization of existing trust relationships.\u201d<\/p><\/blockquote>\n<p>Google\u2019s cybersecurity unit Mandiant <a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/unc1069-targets-cryptocurrency-ai-social-engineering\" href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/unc1069-targets-cryptocurrency-ai-social-engineering\" target=\"_blank\" rel=\"nofollow noopener\">detailed<\/a> in February the group\u2019s use of fake Zoom meetings and a \u201cknown use of AI tools by the threat actor for editing images or videos during the social engineering stage.\u201d<\/p>\n<h2>DPRK\u2019s social engineering is evolving<\/h2>\n<p>Earlier this month, MetaMask developer and security researcher Taylor Monahan said North Korean IT workers have been <a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/cointelegraph.com\/news\/dprk-workers-have-worked-on-countless-protocols-since-defi-summer-cybersec-analyst\" href=\"https:\/\/cointelegraph.com\/news\/dprk-workers-have-worked-on-countless-protocols-since-defi-summer-cybersec-analyst\">embedding themselves<\/a> in crypto companies and decentralized finance projects for at least seven years.<\/p>\n<p>\u201cThe evolution of the DPRK\u2019s social engineering techniques, combined with the increasing availability of AI to refine and perfect these methods, means the threat extends well beyond exchanges,\u201d blockchain security firm Elliptic said in a blog <a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/www.elliptic.co\/blog\/bybit-exploit-12-months-on-the-dprk-threat-continues\" href=\"https:\/\/www.elliptic.co\/blog\/bybit-exploit-12-months-on-the-dprk-threat-continues\" target=\"_blank\" rel=\"nofollow noopener\">post<\/a> earlier this year.\u00a0<\/p>\n<blockquote><p>\u201cIndividual developers, project contributors, and anyone with access to cryptoasset infrastructure is a potential target.\u201d<\/p><\/blockquote>\n<figure><figcaption style=\"text-align: center;\"><em>There are two types of DPRK attack vectors, one more sophisticated than the other. Source: <\/em><a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/x.com\/zachxbt\/status\/2040666565503524932\" href=\"https:\/\/x.com\/zachxbt\/status\/2040666565503524932\" target=\"_blank\" rel=\"nofollow noopener\"><em>ZachXBT<\/em><\/a><\/figcaption><\/figure>\n<p><em><strong>Magazine: <\/strong><\/em><a rel=\"nofollow\" target=\"_blank\" title=\"https:\/\/cointelegraph-magazine.com\/ai-dramatically-accelerated-quantum-threat-bitcoin-ai-eye\/\" href=\"https:\/\/cointelegraph-magazine.com\/ai-dramatically-accelerated-quantum-threat-bitcoin-ai-eye\/\" target=\"_blank\" rel=\"nofollow noopener\"><em><strong>How AI just dramatically sped up the quantum risk for Bitcoin<\/strong><\/em><\/a><\/p>\n<p><template data-type=\"defi_newsletter\" data-name=\"subscription_form\" data-label=\"Subscription Form: DeFi Newsletter\"\/><\/div>\n<div data-testid=\"latest-disclaimer\">Cointelegraph is committed to independent, transparent journalism. This news article is produced in accordance with Cointelegraph\u2019s Editorial Policy and aims to provide accurate and timely information. Readers are encouraged to verify information independently. Read our Editorial Policy <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cointelegraph.com\/editorial-policy\">https:\/\/cointelegraph.com\/editorial-policy<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Crypto wallet Zerion revealed that North Korean-affiliated hackers used AI in a long-term social engineering attack to steal about $100,000 from the company\u2019s hot wallets last week.\u00a0 The Zerion team released a post-mortem on Wednesday, where it confirmed that no user funds, Zerion apps or infrastructure were affected and that it had proactively disabled the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":424459,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[235,203,210,234,231,232,237,238,236,233],"class_list":["post-424446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","tag-bitcoin","tag-crypto-currency","tag-elon-musk","tag-ethereum","tag-hyperledger","tag-ibm","tag-mining","tag-nodes","tag-spacex","tag-tesla"],"_links":{"self":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/424446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/comments?post=424446"}],"version-history":[{"count":1,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/424446\/revisions"}],"predecessor-version":[{"id":424460,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/424446\/revisions\/424460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/media\/424459"}],"wp:attachment":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/media?parent=424446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/categories?post=424446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/tags?post=424446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}