North Korea-linked hackers deploy AI deepfakes and new malware against crypto and fintech firms
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Amazon: Hackers Used AI to Breach 600+ Firewalls in Weeks
Security teams at Amazon traced a compact, likely Russian‑speaking operation that used widely available AI tooling and automated agents to compromise more than 600 perimeter firewalls across roughly 55 countries in about five weeks. The campaign—which automated reconnaissance, credential validation and rapid probing—typifies a broader 2026 trend in which off‑the‑shelf AI compresses the time from discovery to exploitation, forcing defenders to treat exposed management interfaces and self‑hosted AI endpoints as high‑risk assets.
US and Global Outlook: AI Is Rewiring Malware Economics and Attack Paths for 2026
Advances in agentic and generative AI are accelerating attackers’ ability to discover vulnerabilities, craft tailored exploits, and scale precise intrusions, while high‑fidelity synthetic media amplifies social‑engineering at industrial scale. Organizations that rely solely on basic hygiene will be outpaced; defenders must combine rigorous fundamentals with identity‑first controls, behavioral detection, and governed AI playbooks to blunt this shift.

Polyfill.io Compromise Linked to North Korean Operators, Impacting 100k+ Sites
Forensic artifacts (LummaC2 sample and harvested CDN/DNS credentials) tie the 2024 Polyfill.io library compromise to operators aligned with North Korea; investigators warn the incident exemplifies a broader trend of supply‑chain abuse that pairs credential theft, control‑plane takeover, and resilient off‑platform monetization to convert web traffic into crypto flows.
Operation Bizarre Bazaar: Criminal Network Hijacks Exposed LLM Endpoints for Profit and Access
A coordinated criminal campaign scans for unauthenticated LLM and model-control endpoints, then validates and monetizes access—running costly inference workloads, selling API access, and probing internal networks. Some exposed targets are agentic connectors and admin interfaces that can leak tokens, credentials, or execute commands, dramatically raising the stakes beyond billable inference.
Massive 149M credential trove exposes risks from infostealer malware to crypto and government accounts
A researcher found a publicly accessible collection of roughly 149 million stolen logins harvested by credential-stealing malware, including hundreds of thousands tied to major crypto platforms and numerous government-related accounts. The exposure stems from infected end-user devices rather than platform breaches, but it raises urgent questions about account hygiene, phishing risk, and detection across the crypto and social-media ecosystems.

CrowdStrike: AI-Driven Attacks Surge and Collapse Detection Windows
CrowdStrike reports an 89% rise in AI-enabled attacks and an average breakout time of 29 minutes (fastest observed: 27 seconds). Independent industry reporting (IBM, Amazon, vendor incident timelines) shows related but differently scoped increases — compressed exploit windows, automated reconnaissance campaigns that commandeered hundreds of perimeter devices, and rapid moves from disclosure to active targeting — underscoring an urgent need for cross-source telemetry, identity-first controls, and faster containment playbooks.
Trust Undone: How AI Is Reforging Social Engineering into an Industrial-Scale Threat
Generative and agentic AI are enabling deception campaigns that scale personalized manipulation to millions, shifting the primary attack vector from technical flaws to exploited trust. Organizations and states face a widening threat that blends deepfakes, automated reconnaissance, and commoditized fraud tools, forcing a rethink of detection, workflow controls, and human-centered defenses.
South Korea accelerates crypto enforcement with AI-powered market surveillance
South Korea’s Financial Supervisory Service has upgraded its crypto market monitoring system with an automated algorithm that scans trading intervals for signs of manipulation and has secured targeted funding to expand AI capabilities. The move comes amid parallel legislative and enforcement actions — including proposed exchange ownership caps, higher stablecoin capital floors and a major customs-linked crypto money‑laundering bust — that together heighten regulatory scrutiny of crypto venues and flows.