Futures
Hundreds of contracts settled in USDT or BTC
TradFi
Gold
Trade global traditional assets with USDT in one place
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Participate in events to win generous rewards
Demo Trading
Use virtual funds to experience risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and enjoy airdrop rewards!
Futures Points
Earn futures points and claim airdrop rewards
Investment
Simple Earn
Earn interests with idle tokens
Auto-Invest
Auto-invest on a regular basis
Dual Investment
Buy low and sell high to take profits from price fluctuations
Soft Staking
Earn rewards with flexible staking
Crypto Loan
0 Fees
Pledge one crypto to borrow another
Lending Center
One-stop lending hub
VIP Wealth Hub
Customized wealth management empowers your assets growth
Private Wealth Management
Customized asset management to grow your digital assets
Quant Fund
Top asset management team helps you profit without hassle
Staking
Stake cryptos to earn in PoS products
Smart Leverage
New
No forced liquidation before maturity, worry-free leveraged gains
GUSD Minting
Use USDT/USDC to mint GUSD for treasury-level yields
North Korea-Linked Cyber Threat Flags Advanced Crypto Malware Campaign
Google Cloud’s threat intelligence division has flagged a sophisticated and rapidly escalating cyber operation linked to North Korea, targeting cryptocurrency and fintech companies with a potent arsenal of malware and AI-enhanced social engineering tactics. The threat cluster, designated as UNC1069, represents a significant intensification of activities that were first monitored in 2018, now featuring expanded capabilities and more targeted approaches.
Mandiant Uncovers Seven Distinct Malware Variants in Expanding UNC1069 Operation
The investigation by Mandiant, operating under Google Cloud’s security division, revealed an intrusion campaign deploying seven different malware families engineered specifically to harvest and steal sensitive data from targeted organizations. According to the official report, “This investigation uncovered a sophisticated intrusion involving the deployment of seven unique malware toolsets, including newly identified variants designed to capture system information and victim credentials: SILENCELIFT, DEEPBREATH and CHROMEPUSH.”
Two newly discovered malware strains warrant particular attention. CHROMEPUSH and DEEPBREATH represent technical breakthroughs in the attackers’ arsenal, engineered to circumvent critical operating system security protections and extract personal and financial data from compromised systems.
AI-Powered Deepfakes and ClickFix Attacks Drive Social Engineering Success
The North Korea-linked campaign demonstrates sophisticated use of artificial intelligence to enhance its social engineering effectiveness. Attackers compromised legitimate Telegram accounts and orchestrated elaborate fake Zoom meetings featuring AI-generated deepfake videos—a significant evolution in cyber tradecraft. Victims were manipulated into executing hidden malicious commands through so-called ClickFix attacks, a technique that exploits user trust and apparent legitimacy to bypass security awareness defenses.
Why North Korea Targets Cryptocurrency and Fintech Infrastructure
The focus on cryptocurrency and fintech firms reflects broader geopolitical strategies. These sectors hold critical value for both financial theft and intelligence gathering purposes. The 2018 baseline activity suggests this represents a mature, long-running campaign with deep infrastructure and established targeting methodologies.
New Malware Capabilities Signal Escalating Technical Sophistication
Beyond the malware families mentioned in public disclosures, the sophisticated nature of these tools—particularly their ability to bypass operating system protections—indicates North Korea-linked threat actors are continuously advancing their technical capabilities. The combination of seven distinct malware families suggests a modular approach to attacks, allowing operators to customize their toolkit for different victim environments and objectives.
The flagging of this campaign underscores the growing threat North Korea poses to the global financial technology ecosystem and highlights the critical need for cryptocurrency and fintech organizations to enhance their defensive posture against nation-state-level adversaries.