North Korean Hackers Get Crafty: JSON Storage Services Now Delivering Malware!

North Korean threat actors behind the Contagious Interview campaign are now using JSON storage services to stage malicious payloads. These cyber tricksters lure targets via LinkedIn, promising job assessments or project collaborations, only to deliver malware disguised within demo projects hosted on platforms like GitHub and Bitbucket. Sneaky, right?

Pro Dashboard

Hot Take:

North Korean hackers are the craftiest coders on the block! They’ve got more tricks up their sleeves than a magician with a penchant for cyber espionage. From JSON storage to job offers, they’re the true masters of disguise—one minute they’re offering you a job, the next they’re pilfering your sensitive data. Who knew LinkedIn could be so hazardous? Just remember, if an offer sounds too good to be true, it probably comes with a side of malware.

Key Points:

  • North Korean hackers are using JSON storage services to deploy malware.
  • The campaign targets professionals on LinkedIn with fake job offers.
  • Malicious payloads are disguised within legitimate projects on GitHub and GitLab.
  • JavaScript malware known as BeaverTail acts as the initial payload.
  • Additional payloads are fetched using Pastebin and offline onion addresses.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?