Saturday, March 15, 2025
HomeCyber Security NewsNorth Korean Hackers Attacking LinkedIn Users to Deliver RustDoor Malware

North Korean Hackers Attacking LinkedIn Users to Deliver RustDoor Malware

Published on

SIEM as a Service

Follow Us on Google News

North Korean hackers have been identified as targeting LinkedIn users to deliver sophisticated malware known as RustDoor.

This cyber threat underscores the evolving tactics of state-sponsored hacking groups, mainly from North Korea, which have increasingly turned to social engineering on professional networking platforms to achieve their objectives.

The Social Engineering Tactics

North Korean hackers are exploiting LinkedIn, a platform widely used for professional networking, by impersonating recruiters and HR professionals.

According to Jamf Threat Labs, these attackers create fake profiles that mimic legitimate companies, often in the tech sector.

They reach out to potential victims by offering job opportunities, bypassing initial skepticism. 

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The attackers meticulously scout their targets by reviewing their social media activity, focusing on those involved in the cryptocurrency and technology sectors.

Once contact is established, they engage the victim in conversations, eventually leading to malicious software delivery. This method leverages the trust inherent in professional networking and exploits human vulnerabilities in cybersecurity.

The Delivery Mechanism: RustDoor Malware

The primary tool used in these attacks is the RustDoor malware. The process typically involves sending a coding challenge or pre-employment test that appears legitimate.

For instance, victims might receive a Visual Studio project that seems like a standard coding task. However, hidden within this project are malicious scripts designed to execute upon building the project. 

Comparison of configuration
Comparison of configuration

These scripts download additional payloads from remote servers, embedding themselves deeply into the victim’s system.

The RustDoor malware acts as both an infostealer and a backdoor, capable of downloading and uploading files, executing shell commands, and even prompting users for passwords under the guise of legitimate applications like Visual Studio.

{
   "id": 6,
   "name": "Visual Studio",
   "path": "/Applications/Visual Studio.app/",
   "icon": "/Applications/Visual Studio.app/Contents/Resources/VisualStudio.icns",
   "exec": "VisualStudio",
   "show_dialog": true,
   "dialog_title": "Visual Studio Setup",
   "dialog_msg": "Visual Studio requires permission to compilation projects. Please enter password for "
 }

Mitigation and Response

The increasing sophistication of these attacks highlights the need for robust cybersecurity measures and awareness training.

Organizations are urged to educate employees about the risks associated with unsolicited contacts on LinkedIn and other social media platforms.

Individuals must verify the legitimacy of job offers and requests for software execution before proceeding. 

Moreover, technical defenses should be bolstered with regular updates to security software and systems, alongside employing tools that can detect unusual network activities indicative of malware operations.

Companies in the cryptocurrency sector should be particularly vigilant, given their heightened risk profile. 

The ongoing cyber threats from North Korean actors underscore a broader trend of state-sponsored cybercrime leveraging social engineering techniques.

As these tactics become more sophisticated, individuals and organizations must remain vigilant and proactive in their cybersecurity practices to mitigate potential threats effectively.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...