Cyber Security News

North Korean Hackers Attacking LinkedIn Users to Deliver RustDoor Malware

North Korean hackers have been identified as targeting LinkedIn users to deliver sophisticated malware known as RustDoor.

This cyber threat underscores the evolving tactics of state-sponsored hacking groups, mainly from North Korea, which have increasingly turned to social engineering on professional networking platforms to achieve their objectives.

The Social Engineering Tactics

North Korean hackers are exploiting LinkedIn, a platform widely used for professional networking, by impersonating recruiters and HR professionals.

According to Jamf Threat Labs, these attackers create fake profiles that mimic legitimate companies, often in the tech sector.

They reach out to potential victims by offering job opportunities, bypassing initial skepticism. 

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The attackers meticulously scout their targets by reviewing their social media activity, focusing on those involved in the cryptocurrency and technology sectors.

Once contact is established, they engage the victim in conversations, eventually leading to malicious software delivery. This method leverages the trust inherent in professional networking and exploits human vulnerabilities in cybersecurity.

The Delivery Mechanism: RustDoor Malware

The primary tool used in these attacks is the RustDoor malware. The process typically involves sending a coding challenge or pre-employment test that appears legitimate.

For instance, victims might receive a Visual Studio project that seems like a standard coding task. However, hidden within this project are malicious scripts designed to execute upon building the project. 

Comparison of configuration

These scripts download additional payloads from remote servers, embedding themselves deeply into the victim’s system.

The RustDoor malware acts as both an infostealer and a backdoor, capable of downloading and uploading files, executing shell commands, and even prompting users for passwords under the guise of legitimate applications like Visual Studio.

{
   "id": 6,
   "name": "Visual Studio",
   "path": "/Applications/Visual Studio.app/",
   "icon": "/Applications/Visual Studio.app/Contents/Resources/VisualStudio.icns",
   "exec": "VisualStudio",
   "show_dialog": true,
   "dialog_title": "Visual Studio Setup",
   "dialog_msg": "Visual Studio requires permission to compilation projects. Please enter password for "
 }

Mitigation and Response

The increasing sophistication of these attacks highlights the need for robust cybersecurity measures and awareness training.

Organizations are urged to educate employees about the risks associated with unsolicited contacts on LinkedIn and other social media platforms.

Individuals must verify the legitimacy of job offers and requests for software execution before proceeding. 

Moreover, technical defenses should be bolstered with regular updates to security software and systems, alongside employing tools that can detect unusual network activities indicative of malware operations.

Companies in the cryptocurrency sector should be particularly vigilant, given their heightened risk profile. 

The ongoing cyber threats from North Korean actors underscore a broader trend of state-sponsored cybercrime leveraging social engineering techniques.

As these tactics become more sophisticated, individuals and organizations must remain vigilant and proactive in their cybersecurity practices to mitigate potential threats effectively.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited,…

1 hour ago

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems to…

2 hours ago

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to achieve…

3 hours ago

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass authentication…

4 hours ago

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring solution…

4 hours ago

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March 3,…

5 hours ago