JP, co-founder of THORChain and Vultisig, reportedly lost around US$1.35 million in cryptocurrency.
- The attack was a multi-stage scam involving:
- A hacked Telegram account of a friend, which was used to send a fake Zoom link.
 - A deepfake Zoom call (video impersonation) to make the setup appear legitimate.
 - A suspected zero-day exploit or malware that allowed attackers access to private keys stored in iCloud Keychain and an old, forgotten MetaMask wallet.
 
 
Key Details
| Detail | Information | 
|---|---|
| Amount lost | Approx. US$1.35 million | 
| Wallet type | Old MetaMask wallet that was “forgotten” but still had staked / held funds; private keys stored in iCloud Keychain | 
| Hackers suspected | Linked to North Korean actors reportedly. | 
| Protocol / Vultisig security | The Vultisig wallets (multi-signature) were not compromised; only single-key wallet components were breached. CryptoRank | 
Why This Matters
- Deepfake and conference call scams are getting more sophisticated; even prominent crypto figures are vulnerable.
 - Storing private keys or seed phrases in cloud-linked services (like iCloud Keychain) can expose serious risk if those systems are breached.
 - Single-key wallets (software wallets) remain a weak link versus multi-sig or threshold signature wallets that distribute trust.
 
What to Watch Going Forward
- Security experts will likely increase warnings about social engineering + AI tools + credential/identity spoofing.
 - Cryptocurrencies and wallet providers may respond by emphasizing better wallet hygiene: cold storage, multi-sig, minimal key exposure.
 - Regulators may take note and push for more mandatory disclosures or better standards for key security.
 
Conclusion
The THORChain founder deepfake Zoom scam underlines a growing threat landscape in crypto: AI-assisted impersonation, compromised accounts, and overreliance on cloud-based key storage. Though $1.35 million is a large sum, the larger lesson is that even seasoned insiders are not immune. Being proactive with wallet security and skeptical of unexpected digital requests remains crucial.

                                    
