LinkedIn Lures and Crypto Chaos: North Korean Hackers’ Job Scam Unleashed

The Lazarus Group is using fake LinkedIn job offers to spread malware across Windows, macOS, and Linux systems. Enticing targets with remote work promises, the scam escalates to sharing malicious code via GitHub. The malware is sophisticated, utilizing multiple languages and tools to steal data, disable security, and even mine cryptocurrency.

Pro Dashboard

Hot Take:

North Korea’s Lazarus Group is proving that even in the world of cybercrime, networking matters. Who knew that LinkedIn could be the gateway to your next malware infection? Looks like the Lazarus Group’s new skills include pretending to be recruiters, and they’re definitely not planning to endorse you on LinkedIn for ‘avoiding malware’.

Key Points:

  • Lazarus Group targets victims using fake LinkedIn job offers in cryptocurrency and travel sectors.
  • Scam involves enticing targets with remote work, then requesting CVs or GitHub links.
  • Victims receive a link to a supposed decentralized exchange project containing malware.
  • Malware is capable of harvesting data from cryptocurrency wallets and installing a backdoor.
  • Attack techniques exhibit similarities with the Contagious Interview campaign.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?