June 25, 2025 3 min read

likes:

Fact-checked by Angel Hristov

North Korean Hackers Use Fake Zoom to Break into Canadian Gaming Company

The breach began during what appeared to be a routine Zoom meeting between an employee of the gaming firm and an individual they believed to be a trusted associate

A Canadian online gambling business fell victim to a complex cyber attack that used video conferencing software to install harmful programs and steal sensitive data. The attack, which happened on May 28, 2025, has been connected to BlueNoroff, a North Korean cybercrime group famous for major financial thefts.

Hackers Pose as Support Team in Elaborate Zoom Scam

The hack started during what seemed like a normal Zoom call between someone who worked at the gaming company and a person they thought was a business contact. However, the whole thing was a setup. The hackers pretended to be both the contact and Zoom’s help team using a website that looked a lot like the real Zoom website. They faked sound problems during the call, which led the victim to run what they thought was a “Zoom audio fix” program.

What seemed like a real update turned into a full-scale breach. The script was made to appear genuine while setting up malware behind the scenes. Once the installation finished, hackers had already gotten hold of the system login details and started draining data. The harmful code zeroed in on crypto wallets, browser profiles, and chat apps such as Telegram.

Field Effect, the cybersecurity company that looked into the case, said the hackers used clever methods to stay hidden. They rolled out parts disguised as system tasks and used macOS LaunchDaemons. The malware blended with normal work patterns, making it hard to spot even for trained people.

BlueNoroff Hack Reveals Sophisticated Tactics Hidden in Everyday Software

An examination of the infection showed a multi-step attack. The attackers first fooled the victim into giving up their password. They then loaded extra malware, such as a data thief and a remote control tool. These parts talked to outside servers with coded traffic and wiped out signs of their work to dodge alarms.

Experts think this attack is part of a bigger plan that has been going on since at least March 2025. The scheme seems to be about money, which fits with BlueNoroff‘s past of going after companies that deal with crypto and online money.

Security professionals caution that this event shows how cyber crooks are increasingly hiding their attacks in tools and platforms that users rely on. By taking advantage of normal work habits and pretending to be known contacts, attackers lower the odds of raising red flags.

In response to the rising danger, Field Effect has told organizations to boost security measures for online meetings and help interactions. Steps include limiting script running, checking support requests through official channels, and using tools to spot odd behavior on devices.

Silvia has dabbled in all sorts of writing – from content writing for social media to movie scripts. She has a Bachelor's in Screenwriting and experience in marketing and producing documentary films. With her background as a customer support agent within the gambling industry, she brings valuable insight to the Gambling News writers’ team.

Leave a Reply

Your email address will not be published. Required fields are marked *