Saturday, December 7, 2024
HomeCryptocurrency hackNorth Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

Published on

SIEM as a Service

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their tactics, enhancing the obfuscation of their scripts to evade detection. 

InvisibleFerret now boasts a dynamic RMM configuration and OS-specific persistence mechanisms, while Contagious Interview has expanded its arsenal with macOS applications, targeting a wider victim pool. 

These attacks have compromised over 100 devices, leading to the theft of sensitive data like source code, cryptocurrency wallets, and personal information.

- Advertisement - SIEM as a Service

This information is used to create fake identities and secure remote employment in Western countries, facilitated by generative AI.

High-level relationship between the Contagious Interview and WageMole campaigns.
High-level relationship between the Contagious Interview and WageMole campaigns.

The Contagious Interview campaign continues to evolve, leveraging social engineering tactics to lure developers into malicious activities where attackers pose as recruiters on platforms like Freelancer, offering fake job opportunities. 

Build an in-house SOC or outsource SOC-as-a-Service -> Calculate Costs

Once applicants engage, they’re directed to GitHub repositories containing malicious JavaScript code, which, controlled by the attackers, serve as the initial infection vector. 

To maximize their reach, threat actors actively target developers on social media and exploit popular source code hosting platforms like GitHub, GitLab, and BitBucket to distribute malicious files.

Fake job opening that delivers a malicious NPM package 
Fake job opening that delivers a malicious NPM package 

The BeaverTail malware, initially delivered via malicious NPM packages, has evolved to use diverse file types like macOS applications and Windows installers and also employs JavaScript obfuscation and dynamic code execution to evade detection. 

It downloads and executes the InvisibleFerret Python backdoor, which steals system information and exfiltrates sensitive data from victim machines. This demonstrates the threat actor’s persistent efforts to compromise systems.

The InvisibleFerret malware, which is actively under development, has evolved to enhance its data exfiltration capabilities. It now targets browser data, cryptocurrency wallets, and password manager information. 

Exfiltrated data is compressed and encrypted before being sent to Telegram or uploaded to a specified HTTP server.

The malware has integrated functionalities to execute AnyDesk clients and create persistent startup scripts, potentially enabling remote access and control over compromised systems.

Contagious Interview campaign
Contagious Interview campaign

The Contagious Interview campaign is a cyberespionage campaign targeting cryptocurrency developers. It leverages OS-independent scripts (JavaScript and Python) to infect various platforms (Windows, Linux, and macOS) and steal cryptocurrency-related files and login credentials.

WageMole, a suspected North Korean threat group, targets remote job opportunities to gain unauthorized access to company systems and potentially steal data by creating fake profiles on LinkedIn and other job boards, using automation to apply for positions like web developer or engineer. 

 Fake LinkedIn WageMole profiles.
 Fake LinkedIn WageMole profiles.

During interviews conducted on Skype, they may rely on colleagues for technical expertise.

Once employed, WageMole leverages its access to steal data or develop tools like cryptocurrency transfer bots, requesting payment through online platforms to avoid detection. 

According to Zscaler, North Korean threat actors leverage sophisticated techniques to steal data, infiltrate organizations, and evade sanctions.

For example, the Contagious Interview and WageMole campaigns employ refined obfuscation, multi-platform compatibility, and widespread data theft. 

Organizations should rigorously monitor network activity for suspicious indicators to mitigate these threats, enforce strict security measures, and exercise caution when dealing with unknown individuals. 

Thorough background checks, employment history verification, and limited initial access privileges for new hires are also crucial to safeguarding sensitive information and systems.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...