Monday, April 28, 2025
Homecyber securityHackers Delivering Malware Bundled with Fake Job Interview Challenges

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

Published on

SIEM as a Service

Follow Us on Google News

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group known as DeceptiveDevelopment, active since early 20241.

The cybercriminals pose as company recruiters, enticing freelance software developers with fake employment offers.

As part of the elaborate ruse, targets are asked to complete coding tests, such as adding features to existing projects, with the necessary files hosted on private GitHub repositories.

- Advertisement - Google News

Unbeknownst to the candidates, these files are trojanized, and upon execution, the victim’s computer is compromised with the operation’s first-stage malware, BeaverTail.

DeceptiveDevelopment Targets Freelance Developers with Trojanized Projects

DeceptiveDevelopment employs spearphishing tactics on job-hunting and freelancing sites, primarily targeting software developers involved in cryptocurrency and decentralized finance projects.

fake job interview
DeceptiveDevelopment compromise chain

The attackers do not discriminate based on geographical location, aiming to compromise as many victims as possible to maximize their chances of extracting funds and information.

The group has successfully infiltrated Windows, Linux, and macOS systems.

Initial access is gained through fake recruiter profiles on social media, similar to the Lazarus group’s Operation DreamJob, but instead of targeting defense and aerospace engineers, DeceptiveDevelopment focuses on freelance software developers.

North Korea-aligned activity cluster aims to steal cryptocurrency and login information

According to ESET researchers, the attackers often employ a clever trick to conceal their malicious code.

They insert it into a benign component of the project, typically within backend code unrelated to the assigned task, appending it as a single line behind a lengthy comment, effectively moving the code off-screen.

The primary malware families used in these attacks are BeaverTail and InvisibleFerret.

BeaverTail, an infostealer and downloader, extracts browser databases containing saved logins and acts as a downloader for the second stage, InvisibleFerret.

InvisibleFerret is a modular, Python-based malware with spyware and backdoor components.

It can also download legitimate remote management software, such as AnyDesk, for post-compromise activities.

Attribution of DeceptiveDevelopment to North Korea is based on connections between GitHub accounts controlled by the attackers and accounts containing fake CVs used by North Korean IT workers.

These individuals apply for jobs in foreign companies under false identities to generate income for the regime.

The tactics, techniques, and procedures (TTPs) used by DeceptiveDevelopment are also similar to those of other known North Korea-aligned operations, such as Moonstone Sleet and Lazarus’s DreamJob campaign.

Despite their efforts, the threat actors often exhibit a lack of attention to detail, such as failing to remove development notes or commented-out local IP addresses from their code.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...