Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

N. Korean Hackers Target Freelance Developers in a Malware Job Scam!

N. Korean Hackers Target Freelance Developers in a Malware Job Scam!

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as Beaver Tail & Invisible Ferret.

The activity, linked to N. Korea, has been codenamed Deceptive Development, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima, PurpleBravo, & Tenacious Pungsan. The campaign has been ongoing since at least late 2023.

Spear-Phishing

“Deceptive Development targets freelance software developers through spear-phishing on job-hunting & freelancing sites, aiming to steal cryptocurrency wallets & login information from browsers & password managers,” cyber-security company ESET said in a report.

In Nov. 2024, ESET confirmed the overlaps between Deceptive Development & Contagious Interview, classifying it as a new Lazarus Group activity that operates with an aim to conduct cryptocurrency theft.

Fake Recruiter Profiles

The attack methods are characterised by the use of fake recruiter profiles on social media to reach out to prospective targets & share with them trojanised codebases hosted on GitHub, GitLab, or Bitbucket that deploy backdoors under the pretext of a job interview process.

Later versions of the campaign have expanded to other job-hunting platforms like Upwork, Freelancer.com, We Work Remotely, Moonlight, & Crypto Jobs List. As previously highlighted, these hiring challenges typically entail fixing bugs or adding new features to the crypto-related project.

Bogus Projects

Other than coding tests, the bogus projects pretend to be cryptocurrency initiatives, games with blockchain functionality, & gambling apps with cryptocurrency features. Usually, the malicious code is embedded within a benign component in the form of a single line.

“Additionally, they are instructed to build & execute the project in order to assess it, which is where the initial compromise happens,” security researcher Matěj Havránek said. “The repositories used are usually private, so the victim is 1st asked to provide their account ID or email address to be granted access to them, most likely to conceal the malicious activity from researchers.”

Video Conferencing

A 2nd method used for achieving initial compromise revolves around tricking their victims into installing a malware-laced video conferencing platform like Miro Talk or Free Conference.

While both Beaver Tail & Invisible Ferret come with information-stealing capabilities, the former serves as a downloader for the latter. Beaver Tail also comes in 2 types: A JavaScript variant that can be placed within the trojanised projects & a native version built using the Qt platform that is disguised as conferencing software.

Modular Python Malware

Invisible Ferret is a modular Python malware that retrieves & executes 3 additional components –

  • pay, which collects information & acts as a backdoor that is capable of accepting remote commands from an attacker-controlled server to log keystrokes, capture clipboard content, run shell commands, exfiltrate files & data from mounted drives, as well as install the Any Desk & browser module, & gather information from browser extensions & password managers.
  • bow, which is responsible for stealing login data, autofill data, & payment information stored in Chromium-based browsers like Chrome, Brave, Opera, Yandex, & Edge
  • adc, which functions as a persistence mechanism by installing the Any Desk remote desktop software.

Cryptocurrency

ESET explained that the primary targets of the campaign are software developers working in cryptocurrency & decentralised finance projects across the world, with significant concentrations reported in Finland, India, Italy, Pakistan, Spain, S. Africa, Russia, Ukraine, & the US.

“The attackers don’t distinguish based on geographical location & aim to compromise as many victims as possible to increase the likelihood of successfully extracting funds & information.

Poor Coding Practices

This is also evidenced in the apparent poor coding practices used by the operators, ranging from a failure to remove development notes to local IP addresses used for development & testing, indicating that the intrusion is not concerned about stealth.

The use of job interview decoys is a classic strategy adopted by various N. Korean hacking groups, the most prominent of which is a long-running campaign dubbed Operation Dream Job.

Also, there is evidence that suggests that the threat players are also involved in the fraudulent IT worker scheme, in which N. Korean nationals apply for overseas jobs under false identities in order to draw regular salaries as a way to fund the regime.

GitHub Accounts

The overlaps include mutual follows between GitHub accounts controlled by the attackers & those containing fake CVs used by N. Korean IT workers. Some of the GitHub pages in question have since been taken down.

“The Deceptive Development cluster is an addition to an already large collection of money-making schemes employed by N. Korea-aligned players & conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies,” ESET stated.

“During our research, we observed it go from primitive tools & techniques to more advanced & capable malware, as well as more polished techniques to lure in victims & deploy the malware.”

 

SHARE ARTICLE