Crypto Users Targeted as Fake Zoom Malware Campaign Drains $300 Million
Security teams advise fast containment after any suspicious meeting link or file. They recommend taking the device offline and shutting it down, then using a separate clean device to move funds to new wallets. Users should rotate passwords, enable two-factor authentication, and terminate unknown messaging sessions before returning to normal activity.
The warning lands as totals remain high. North Korean groups, including Lazarus, have faced repeated links to major thefts and social engineering campaigns, including job and interview lures aimed at crypto companies.
Reports have also linked Lazarus to a breach that drained roughly $30.6 million from Upbit. Separate estimates put total crypto theft at roughly $2.17 billion by mid-2025.
Ethereum developers also reported a recent disruption that did not involve an external attacker. Prysm developers said a bug introduced ahead of the triggered a validation slowdown on Dec. 4, which led to missed slots and reduced validator rewards, without a loss of finality.
A post-mortem said affected Prysm nodes regenerated older chain states and exhausted resources while processing attestations. Prysm estimated about 382 ETH in missed rewards across its validators during the episode. Developers issued a workaround and then released a patch, while the incident renewed attention on client diversity after researchers noted Lighthouse still holds a majority share of Ethereum’s consensus clients.
Source: www.analyticsinsight.net
Published: 2025-12-15 20:06:00
Tags:
This article was automatically curated from public sources. For full details, visit the original source link above.
