A Fake Zoom Call Nearly Cost This Company Hundreds of Thousands in ETH

A Fake Zoom Call Nearly Cost This Company Hundreds of Thousands in ETH

Working in the crypto industry can cause you to believe that you’re prone to scammers. The hard truth is that anyone’s susceptible to fraud no matter the position, especially when AI tools producing hyperrealistic deepfakes are growing more advanced by the minute. Our case from early 2026 proves the point. A cryptocurrency company was compromised through a social engineering attack targeting one of its employees.  The attacker initiated contact via a fake Zoom call and, during the session, convinced the employee that a software update was required to continue. The "update" was malware. Through it, the attacker gained access to the company’s wallets and extracted several hundred thousand dollars in ETH.

Response Timeline

Day 0 – The attack was executed through a single point of compromise: one employee, one fake call, one malicious file. The malware gave the attacker access to wallet credentials on the compromised device. Several hundred thousand dollars in ETH were moved out in the same window.

Day 3 – The company discovered the breach and contacted AMLBot. The investigation team immediately identified and labeled all attacker-controlled wallet addresses and activated 24/7 monitoring. The funds hadn’t moved yet beyond the initial theft.

Day 3-13 – The attacker went quiet in a deliberate tactic to let the initial alarm die down, nothing moved.

This is the part of the investigation that tends to go unseen. While the attacker waited, AMLBot’s team worked backward through the attacker’s wallet history prior to the attack. On-chain behavior leaves patterns: which types of services a wallet has interacted with, how funds have been moved in the past, what the likely exit routes look like. By the time the attacker decided to act, the team already had a working picture of where the funds would probably go.

Day ~13 – The attacker started routing the ETH toward non-KYC exchanges, and AMLBot flagged the movements in real time. Working with the client and through the appropriate channels, the funds were blocked across three separate services before they could be fully processed or withdrawn. 

As a result of AMLBot helping the company build the documentation needed to engage law enforcement and present the case, the funds were successfully returned in full.

The Detail That Made the Difference

The ten-day silence from the attacker gave the AMLBot team time to build a predictive picture using their prior wallet behavior. When the movement started, the response was immediate thanks to the team having already mapped out the likely next moves. No lucky timing played a role here.

FAQ

Can Stolen Cryptocurrency Actually Be Recovered?

Yes, though outcomes depend heavily on how quickly the investigation starts and which channels are engaged. Recovery hinges on tracing funds before they're cashed out and working with exchanges and law enforcement to freeze them at the right moment. In the case above, several hundred thousand dollars in ETH were fully returned. That's not the default outcome in every case, but with timely investigation it's a realistic one.

What Should a Company Do Immediately after a Crypto Breach?

Three things, in this order: contain the compromise (disconnect affected devices, rotate credentials, secure remaining wallets); document everything (transaction hashes, attacker wallet addresses, timestamps, any communication logs); and contact a crypto recovery service like AMLBot within the first 24 hours. The first hours after a theft are when monitoring is most effective and exit routes are still open. Waiting closes off options that often can't be reopened later.

How Are Stolen Funds Traced When Attackers Use Non-KYC Exchanges?

Non-KYC platforms don't require identity documents, but every transaction still settles on a public blockchain. Investigators map wallet clusters, analyze on-chain behavior, and identify the services where stolen funds are likely to land. When attacker-controlled wallets interact with a non-KYC exchange, those funds can often be flagged and frozen at the platform level through direct cooperation — which is exactly how three exchanges blocked the ETH in this case. Non-KYC doesn't mean untraceable, it means the tracing works differently.

How Long after a Theft Is Recovery Still Possible?

Best chance: same day. Within a week, options start narrowing. After several weeks, the funds have usually been laundered through enough hops that recovery becomes much harder — though not always impossible. The biggest factor isn't time itself but whether the funds have already been cashed out or mixed. Once they're off-chain and sitting as fiat under another name, the process shifts heavily toward law enforcement and slows considerably.

How Does On-Chain Investigation Work?

It operates in three layers.
1. Address Attribution — labeling wallets controlled by the attacker and the services they interact with.
2. Behavioral Analysis — studying historical activity to predict likely exit routes before the attacker uses them.
3. Real-Time Monitoring — flagging movements the moment they happen and coordinating with exchanges to block funds before withdrawal.
The case above worked because all three were in place by the time the attacker started moving funds. The ten-day silence wasn't a pause for the investigation — it was used.