The PolySwarm Blog

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

UNC1069 Uses New Tools to Target Crypto Entities

Feb 20, 2026 1:53:03 PM / by The Hivemind

UNC1069-2026Verticals Targeted: Cryptocurrency, Financial
Regions Targeted: Not specified
Related Families: SUGARLOADER, WAVESHAPER, HYPERCALL, HIDDENCALL, SILENCELIFT, DEEPBREATH, CHROMEPUSH

Executive Summary

A targeted intrusion into a FinTech entity in the cryptocurrency sector was attributed to UNC1069, a North Korea-nexus financially motivated threat actor. The operation deployed seven unique malware families on a macOS host through sophisticated social engineering involving a compromised Telegram account, a spoofed Zoom meeting, a reported deepfake video, and a ClickFix technique to initiate infection.

Key Takeaways

  • UNC1069 leveraged a multi-stage infection chain starting with social engineering via hijacked Telegram and fake Zoom, using ClickFix commands to execute initial payloads on macOS.
  • New tooling including SILENCELIFT, DEEPBREATH, and CHROMEPUSH was deployed alongside a known downloader, SUGARLOADER.
  • The attack focused on harvesting credentials, browser data, session tokens, Keychain items, Telegram data, and Apple Notes to enable cryptocurrency theft and support future social engineering.
  • Persistence was achieved via a manually configured launch daemon for SUGARLOADER, while XProtect behavioral detections in the XPdb database aided forensic reconstruction despite lacking EDR.

The Activity

North Korean threat actors linked to UNC1069 continue to refine their approaches against cryptocurrency and DeFi organizations, as evidenced by a recent intrusion into a FinTech target. Mandiant reported on this activity. Active since at least 2018 and suspected with high confidence to maintain a DPRK nexus, UNC1069 demonstrated expanded tooling and social engineering sophistication in this operation.

The intrusion commenced with social engineering conducted through a compromised Telegram account belonging to a cryptocurrency executive. After establishing contact, the actor forwarded a Calendly scheduling link that redirected to a spoofed Zoom domain under their control. During the call, the victim observed what appeared to be a deepfake video of another cryptocurrency CEO, simulating audio difficulties to justify a ClickFix ruse. Instructions delivered via a malicious webpage prompted execution of commands tailored for macOS or Windows, embedding the infection trigger.

On the macOS victim system, the commands downloaded and executed an initial payload, leading to AppleScript activity followed by deployment of a packed C++ backdoor designated WAVESHAPER. This component acted as an entry point, facilitating deployment of HYPERCALL, a Go-language downloader that reflectively loads dynamic libraries from C2 servers after RC4 decryption of configuration data. HYPERCALL delivered HIDDENCALL (a Golang backdoor providing interactive access), SUGARLOADER (a known C++ downloader), and SILENCELIFT (a minimal C/C++ beacon collecting host details).

Further tooling expanded data collection capabilities. DEEPBREATH, implemented in Swift, bypassed macOS TCC protections by staging and modifying the TCC database through Finder's Full Disk Access privileges, granting unauthorized access to steal Keychain credentials, browser artifacts from Chrome, Brave, and Edge, Telegram databases, and Apple Notes content. Stolen items were archived into ZIP files and exfiltrated using curl.

SUGARLOADER, configured with an RC4-encrypted file and persistence via a launch daemon masquerading as a system updater, exclusively deployed CHROMEPUSH. Written in C++, CHROMEPUSH installed itself as a native messaging host disguised as a Google Docs offline extension, targeting Chromium browsers to log keystrokes, capture credentials, extract cookies, and potentially record screenshots before exfiltrating via HTTP POST.

Forensic analysis benefited from macOS XProtect Behavioral Service logs in the XPdb database, which captured violations and timestamps for deleted malware, enabling reconstruction of the sequence absent EDR coverage.

UNC1069's shift toward Web3 targeting since 2023 has included cryptocurrency exchanges, developers, and venture capital personnel, with increasing integration of AI tools for reconnaissance, tooling development, and lure creation. This incident underscores the group's determination to maximize credential and session data harvested from individual high-value targets to support financial theft and identity-based follow-on campaigns.

Who is UNC1069?

UNC1069, also known as CryptoCore and MASAN, is a financially motivated threat actor, suspected with high confidence to have a North Korea nexus. The group has been active since at least 2018 and has shifted focus to targeting the cryptocurrency sector, including startups, software developers, venture capital firms, and related fintech entities, using sophisticated social engineering tactics such as compromised Telegram accounts, fake Zoom meetings, ClickFix infection vectors, and AI-generated videos/deepfakes to deploy malware for credential theft, browser data harvesting, and facilitation of financial theft.

IOCs

PolySwarm has multiple samples associated with this activity.

 

SUGARLOADER

1a30d6cdb0b98feed62563be8050db55ae0156ed437701d36a7b46aabf086ede

 

Click here to view all samples of SUGARLOADER in our PolySwarm portal.

 

WAVESHAPER

B525837273dde06b86b5f93f9aec2c29665324105b0b66f6df81884754f8080d

 

Click here to view all samples of WAVESHAPER in our PolySwarm portal.

 

Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.

Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.

 

Topics: Threat Bulletin, social engineering, Cryptocurrency Theft, MacOS malware, North Korean threat actors, DeFi targeting, deepfake, UNC1069

The Hivemind

Written by The Hivemind

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

See all

Recent Posts