Thursday, April 24, 2025
HomeCyber Security NewsNorth Korean Hackers Attacking LinkedIn Users to Deliver RustDoor Malware

North Korean Hackers Attacking LinkedIn Users to Deliver RustDoor Malware

Published on

SIEM as a Service

Follow Us on Google News

North Korean hackers have been identified as targeting LinkedIn users to deliver sophisticated malware known as RustDoor.

This cyber threat underscores the evolving tactics of state-sponsored hacking groups, mainly from North Korea, which have increasingly turned to social engineering on professional networking platforms to achieve their objectives.

The Social Engineering Tactics

North Korean hackers are exploiting LinkedIn, a platform widely used for professional networking, by impersonating recruiters and HR professionals.

- Advertisement - Google News

According to Jamf Threat Labs, these attackers create fake profiles that mimic legitimate companies, often in the tech sector.

They reach out to potential victims by offering job opportunities, bypassing initial skepticism. 

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The attackers meticulously scout their targets by reviewing their social media activity, focusing on those involved in the cryptocurrency and technology sectors.

Once contact is established, they engage the victim in conversations, eventually leading to malicious software delivery. This method leverages the trust inherent in professional networking and exploits human vulnerabilities in cybersecurity.

The Delivery Mechanism: RustDoor Malware

The primary tool used in these attacks is the RustDoor malware. The process typically involves sending a coding challenge or pre-employment test that appears legitimate.

For instance, victims might receive a Visual Studio project that seems like a standard coding task. However, hidden within this project are malicious scripts designed to execute upon building the project. 

Comparison of configuration
Comparison of configuration

These scripts download additional payloads from remote servers, embedding themselves deeply into the victim’s system.

The RustDoor malware acts as both an infostealer and a backdoor, capable of downloading and uploading files, executing shell commands, and even prompting users for passwords under the guise of legitimate applications like Visual Studio.

{
   "id": 6,
   "name": "Visual Studio",
   "path": "/Applications/Visual Studio.app/",
   "icon": "/Applications/Visual Studio.app/Contents/Resources/VisualStudio.icns",
   "exec": "VisualStudio",
   "show_dialog": true,
   "dialog_title": "Visual Studio Setup",
   "dialog_msg": "Visual Studio requires permission to compilation projects. Please enter password for "
 }

Mitigation and Response

The increasing sophistication of these attacks highlights the need for robust cybersecurity measures and awareness training.

Organizations are urged to educate employees about the risks associated with unsolicited contacts on LinkedIn and other social media platforms.

Individuals must verify the legitimacy of job offers and requests for software execution before proceeding. 

Moreover, technical defenses should be bolstered with regular updates to security software and systems, alongside employing tools that can detect unusual network activities indicative of malware operations.

Companies in the cryptocurrency sector should be particularly vigilant, given their heightened risk profile. 

The ongoing cyber threats from North Korean actors underscore a broader trend of state-sponsored cybercrime leveraging social engineering techniques.

As these tactics become more sophisticated, individuals and organizations must remain vigilant and proactive in their cybersecurity practices to mitigate potential threats effectively.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...