Threat actors believed to be linked to North Korea are leveraging convincing Zoom meeting invitations and social engineering tactics to compromise professional users.
The attack method, recently experienced by a technology executive, underscores an escalation in the technical acumen and patience of malicious actors targeting business professionals through trusted platforms like LinkedIn, Telegram, and widely-used calendar booking tools.
Threat Actors Imitate Professional Outreach
The scam in question began with a seemingly routine message on LinkedIn from an account named Valéria Pereira, expressing interest in the executive’s company.

The conversation was soon shifted to Telegram, where the attackers scheduled a meeting using a legitimate calendar link. No immediate red flags were apparent during this initial outreach.
However, shortly before the scheduled call, the attackers sent a purported Zoom link ostensibly for a team meeting via Telegram.
The provided URL (usweb08.us), on quick inspection, appeared similar to a legitimate Zoom link but was, in fact, a cleverly disguised phishing site.
Upon navigating to the site, the victim was met with a meticulously crafted imitation of the Zoom interface, complete with video tiles, simulated chat messages, and fake participants engaging in small talk an elaborate attempt to mimic a real, ongoing meeting.
The deception was further enhanced by a technical manipulation: when the victim’s audio ostensibly failed to connect, the site redirected them to a fraudulent Zoom help page.
There, the victim was prompted to run terminal commands under the guise of resolving audio issues a ploy designed to grant attackers remote access to the victim’s system or harvest sensitive information such as private keys and crypto assets.
The attackers’ persistence became apparent when the victim, suspicious of the request, insisted on moving the meeting to Google Meet.
The attackers refused, citing “company policy,” and promptly erased all traces of the Telegram conversation before vanishing.
Lure Victims with Fake Zoom Links
Subsequent investigation into the fraudulent domain revealed that it had been registered just days prior using what appear to be fabricated credentials, linking the domain’s ownership to a so-called Daniel Castagnolii of Hana Network, with a registration address in Columbus, Indiana, and a Gmail contact.
The domain was registered via Namecheap, a common choice for cybercriminals due to its accessibility and privacy features.
The calendar invite originated from the email address [email protected], further suggesting the use of disposable or specially crafted accounts for such attacks.
This attack highlights the new level of sophistication employed by North Korean state-sponsored groups and similar entities, who have refined social engineering approaches to exploit the remote work culture that relies heavily on instant scheduling and familiar collaboration tools.
The attackers’ ability to create authentic-looking meeting environments increases the likelihood of victims complying with malicious instructions such as running terminal commands without questioning their legitimacy.
Security experts urge organizations and individuals to exercise heightened vigilance: always verify web addresses before entering credentials or downloading files; never execute command-line instructions from untrusted or unverified sources, regardless of apparent urgency or technical justification; and remain alert to any unusual resistance to platform changes or requests for secrecy.
The continuous evolution of these attacks demonstrates that even seasoned professionals are not immune to deception in today’s remote-first world.
Awareness, careful scrutiny of digital interactions, and company-wide cybersecurity training are now more critical than ever to thwart such highly targeted and technically sophisticated threats.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates