Close Menu
    Instagram
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Instagram
    Crypto Celtic
    • Home
    • Crypto News
      • Bitcoin
      • Ethereum
      • Altcoins
      • Blockchain
      • DeFi
    • AI News
    • Stock News
    • Learn
      • Crypto for Beginners
      • AI for Beginners
      • AI Tips
      • Make Money with AI
    • Reviews
    • Tools
      • Best AI Tools
      • Crypto Market Cap List
      • Stock Market Overview
      • Market Heatmap
    • Contact
    Crypto Celtic
    Home»Crypto News»Altcoins»THORChain Founder Loses $1.35M After Deepfake Zoom And Telegram Scam
    THORChain
    Altcoins

    THORChain Founder Loses $1.35M After Deepfake Zoom And Telegram Scam

    September 13, 20253 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    kraken


    Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure

    A co-founder of THORChain had roughly $1.35 million taken from a forgotten MetaMask wallet after attackers used a hacked Telegram account and a fake Zoom meeting to gain access to his stored keys, according to reports. The theft was first flagged on-chain and later confirmed by multiple news outlets and investigators.

    THORChain: Multi-Stage Scam

    Based on reports, the scheme began when an associate’s Telegram was compromised and a malicious meeting link was circulated. The target joined what appeared to be a legitimate video call, but the feed was fake.

    coinbase

    Attackers then exploited access to the victim’s iCloud Keychain and browser profile to extract private keys tied to an old wallet, which was drained of about $1.35 million in crypto.

    $1.35M was stolen from a Thorchain cofounder. Yet another reminder: if your keys are stored in a software wallet, you’re only one malicious code execution away from losing everything.

    In this case, the victim didn’t even sign a malicious transaction, the malware simply stole the… pic.twitter.com/nLS4nWNFyt

    — Charles Guillemet (@P3b7_) September 12, 2025

    Investigators And On-Chain Sleuths Chime In

    Blockchain investigators quickly traced movements and posted findings on social platforms, with some early on-chain sleuths estimating the visible value at roughly $1.2 million before later reports put the total near $1.35 million.

    Analysts flagged links to North Korea–connected actors based on patterns and prior behavior, though attribution in such cases can be complex and takes time to confirm.

    #PeckShieldAlert A @thorchain user’s personal wallet was exploited, resulting in a loss of ~$1.2M pic.twitter.com/R385BRHoHu

    — PeckShieldAlert (@PeckShieldAlert) September 12, 2025

    Security Community Issues Warning

    Leaders in the crypto security scene warned the industry to treat remote meeting links and sudden file requests with deep caution.

    A senior wallet developer highlighted that storing private keys in software that syncs to cloud services makes a user vulnerable if those cloud accounts are accessed by malware or other exploits. That warning was echoed across developer and security feeds after the theft was disclosed.

    Total crypto market cap currently at $3.91 trillion. Chart: TradingView

    THORSwap Offers Bounty To Recover Funds

    Reports have disclosed that a related project put up a reward to help recover the stolen funds, and community members began tracking transactions to identify where the assets moved.

    Public appeals and bounties have become a common community response when large sums are siphoned off and on-chain tracing points to identifiable wallets.

    Wider Pattern Of Deepfake And Zoom Scams

    This incident is part of a growing string of attacks that use fake video calls and impersonation to trick targets into running malicious code or revealing credentials.

    Major cases elsewhere have cost victims millions, including an earlier story in which deepfakes and fake calls led to a multi-million loss at a corporate level.

    Security researchers say criminals are now combining social engineering with AI tools to make scams more convincing.

    Featured image from IT Security Guru, chart from TradingView

    Editorial Process for bitcoinist is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.





    Source link

    zkp
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    HSBC EXECUTIVE JUST DROPPED A MAJOR XRP BOMBSHELL LIVE!

    April 18, 2026

    Chiliz price surges amid adoption in South Korea and UEFA Champions League excitement

    April 18, 2026

    France To Boost Crypto Holders’ Security Amid Attacks Rise

    April 17, 2026

    Why the SEC just gave self custody crypto apps 5 years to get traditional broker licenses

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    How To Make Your First $5000 With Claude AI (make money online)

    April 18, 2026

    How to Make AI Videos for Beginners: Zero to Expert in 15 Min

    April 18, 2026

    Claude Code for Desktop is the BEST way to build apps with AI EVER (full tutorial)

    April 18, 2026

    Chiliz price surges amid adoption in South Korea and UEFA Champions League excitement

    April 18, 2026

    AllUnity Expands EURAU Stablecoin Into Uniswap DeFi Liquidity Pools

    April 18, 2026
    cryptocom
    LEGAL INFORMATION
    • Privacy Policy
    • Terms Of Service
    • Social Media Disclaimer
    • DMCA Compliance
    • Anti-Spam Policy
    Top Insights

    Robert Kiyosaki Warns ‘Everything Bubble’ Collapse Could Trigger Greatest Depression as Global Economy Cracks

    April 19, 2026

    Stablecoins Behave Like FX Markets as Liquidity Splits: Eco CEO

    April 18, 2026
    ledger
    Instagram
    © 2026 CryptoCeltic.com - All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.