![]() |
Bitcoin Season 2 | Blockspace MediaConversations about Bitcoin covering markets, tech, compute, and culture from hosts Charlie Spears and Colin Harper. Author: Blockspace Media
Conversations about Bitcoin covering markets, tech, compute, and culture from hosts Charlie Spears and Colin Harper. Listen for weekly shows covering everything from deep Bitcoin mining to the conversation of the week in Bitcoin. We talk with the executives, operators, deal makers, financers and builders making the digital frontier happen. Available on all podcast players, YouTube and on syndication platforms like Yahoo Finance, CoinDesk and more! Be sure to subscribe and give us a five star review so you never miss a podcast! Language: en Genres: News, Tech News, Technology Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
How North Korean Hackers Stole $300M+ Via Telegram w/ Taylor Monahan
Saturday, 31 January, 2026
Subscribe to the Blockspace newsletter! Welcome back to The Blockspace Podcast! Today, Taylor Monahan, a security lead at MetaMask, joins us to talk about a highly sophisticated $300M phishing attack linked to North Korea’s Lazarus Group. Taylor shares how the Lazarus Group hijacks Telegram accounts to lure victims into fake Zoom meetings and download a Trojan horse malware program. We break down the hackers’ strategy, how the malware works, which wallet types are most vulnerable to theft, and what users can do to protect themselves if they have fallen prey to the scam or not. Tune in to learn how to identify these red flags and implement better digital hygiene for your crypto assets. Check out this article for a deep dive into how the malware works; plus, follow Taylor for updates on X and keep track of Lazarus Group’s history of hacks via her Github. Notes: * Lazarus Group stole over $300M in the last year. * Attackers hijack Telegram accounts. * Scammers use fake Zoom links to deploy malware. * Malware often bypasses paid antivirus software. * Sandbox architecture on iOS offers more safety. * Software wallets and browser wallets are most vulnerable. * 2FA remains critical for sensitive account access. Timestamps: 00:00 Start 03:51 Telegram attack 11:30 2 Factor Authenticators 13:48 Losses 16:38 Calculating losses 19:08 North Korea 21:52 Malware 24:17 Malware detection 25:16 EDR 27:12 Wallets 34:21 Is verifying addresses enough? 39:28 Wallet malware design 44:11 What do they want? 54:16 Taylor stealing payloads 1:01:49 Steps to protect 👉CleanSpark, America's Bitcoin Miner! CleanSpark (Nasdaq: CLSK) is a market-leading data center developer with a proven track record of success. We own a portfolio of power, land, and data centers across the United States powered by globally competitive energy prices. Sitting at the intersection of Bitcoin, energy, operational excellence and capital stewardship, we optimize our infrastructure to deliver superior returns to our shareholders. Monetizing low-cost, high reliability energy by producing a global emerging critical resource – compute – positions us to prosper in an ever-changing world. Learn more about your ad choices. Visit megaphone.fm/adchoices










