💥 Gate Square Event: #PostToWinPORTALS# 💥
Post original content on Gate Square related to PORTALS, the Alpha Trading Competition, the Airdrop Campaign, or Launchpool, and get a chance to share 1,300 PORTALS rewards!
📅 Event Period: Sept 18, 2025, 18:00 – Sept 25, 2025, 24:00 (UTC+8)
📌 Related Campaigns:
Alpha Trading Competition: Join for a chance to win rewards
👉 https://www.gate.com/announcements/article/47181
Airdrop Campaign: Claim your PORTALS airdrop
👉 https://www.gate.com/announcements/article/47168
Launchpool: Stake GT to earn PORTALS
👉 https://www.gate.com/announcements/articl
Deep-Fake Zoom Call Leads to $1.35 Million Crypto Heist
In a chilling example of advanced cybercrime, the founder of THORChain and Vultisig, known as @jpthor, has reportedly lost $1.35 million in a sophisticated crypto hack involving a deep-fake Zoom call. The incident was exposed by Ledger's Chief Technology Officer, Charles Guillemet, who highlighted the hack as a critical warning for the entire cryptocurrency community. The attack began when a scammer, after compromising a friend's Telegram account, sent a malicious Zoom link for what appeared to be a genuine conference call.
The Mechanics of the Attack
The Zoom call itself was a deep-fake, an AI-generated imitation. The scammer's primary objective was to steal the victim's private keys, which were unfortunately stored in his iCloud Keychain. This gave the hackers a direct path to an old Metamask software wallet holding the crypto. The CTO of Ledger emphasized a crucial point about the hack: the victim did not need to sign any malicious transaction. The malware simply stole the private keys, demonstrating the extreme vulnerability of storing significant digital assets in software wallets. Guillemet's message to the crypto world was stark and clear: storing assets on a software wallet is a matter of "when, not if, you will be drained."
A Critical Security Reminder
The incident serves as a stark reminder of the evolving threats in the digital asset space. The use of deep-fake technology and the targeting of personal digital storage systems like iCloud Keychain represents a new level of sophistication for cybercriminals, possibly from groups in North Korea. Experts are reiterating the paramount importance of using hardware wallets, which keep private keys offline and physically separate from internet-connected devices, to protect digital assets from such advanced threats.