Cyber Security News

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group known as DeceptiveDevelopment, active since early 20241.

The cybercriminals pose as company recruiters, enticing freelance software developers with fake employment offers.

As part of the elaborate ruse, targets are asked to complete coding tests, such as adding features to existing projects, with the necessary files hosted on private GitHub repositories.

Unbeknownst to the candidates, these files are trojanized, and upon execution, the victim’s computer is compromised with the operation’s first-stage malware, BeaverTail.

DeceptiveDevelopment Targets Freelance Developers with Trojanized Projects

DeceptiveDevelopment employs spearphishing tactics on job-hunting and freelancing sites, primarily targeting software developers involved in cryptocurrency and decentralized finance projects.

DeceptiveDevelopment compromise chain

The attackers do not discriminate based on geographical location, aiming to compromise as many victims as possible to maximize their chances of extracting funds and information.

The group has successfully infiltrated Windows, Linux, and macOS systems.

Initial access is gained through fake recruiter profiles on social media, similar to the Lazarus group’s Operation DreamJob, but instead of targeting defense and aerospace engineers, DeceptiveDevelopment focuses on freelance software developers.

North Korea-aligned activity cluster aims to steal cryptocurrency and login information

According to ESET researchers, the attackers often employ a clever trick to conceal their malicious code.

They insert it into a benign component of the project, typically within backend code unrelated to the assigned task, appending it as a single line behind a lengthy comment, effectively moving the code off-screen.

The primary malware families used in these attacks are BeaverTail and InvisibleFerret.

BeaverTail, an infostealer and downloader, extracts browser databases containing saved logins and acts as a downloader for the second stage, InvisibleFerret.

InvisibleFerret is a modular, Python-based malware with spyware and backdoor components.

It can also download legitimate remote management software, such as AnyDesk, for post-compromise activities.

Attribution of DeceptiveDevelopment to North Korea is based on connections between GitHub accounts controlled by the attackers and accounts containing fake CVs used by North Korean IT workers.

These individuals apply for jobs in foreign companies under false identities to generate income for the regime.

The tactics, techniques, and procedures (TTPs) used by DeceptiveDevelopment are also similar to those of other known North Korea-aligned operations, such as Moonstone Sleet and Lazarus’s DreamJob campaign.

Despite their efforts, the threat actors often exhibit a lack of attention to detail, such as failing to remove development notes or commented-out local IP addresses from their code.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…

42 minutes ago

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…

50 minutes ago

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…

54 minutes ago

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…

60 minutes ago

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…

4 hours ago

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…

4 hours ago