Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean hackers use fake interviews to infect developers with cross-platform malware
Global Security

North Korean hackers use fake interviews to infect developers with cross-platform malware

AdminBy AdminOctober 9, 2024No Comments2 Mins Read
Cross-Platform Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 9, 2024Ravi LakshmananPhishing attack / malware

Cross-platform malware

Attackers linked to North Korea have been seen targeting job seekers in the tech industry to deliver updated versions of popular malware families tracked as BeaverTail and InvisibleFerret.

The cluster of activity tracked as CL-STA-0240 is part of a duplicate campaign Contagious interview that Palo Alto Networks Unit 42 disclosed for the first time in November 2023.

“The threat actor behind CL-STA-0240 is contacting software developers through job search platforms, posing as potential employers,” – Unit 42 said in a new report.

Cyber ​​security

“The attackers invite the victim to participate in an online interview where the threat actor tries to convince the victim to download and install malware.”

The first stage of the infection includes the BeaverTail downloader and information stealer, designed to target Windows and Apple macOS platforms. The malware acts as a conduit for the Python-based InvisibleFerret backdoor.

There is evidence that activity remains active despite public disclosures indicating that the threat actors behind the operation continue to experience success in tricking developers into executing malicious code under the guise of coding intent.

N. Korean Hackers

Security researcher Patrick Wardle and cybersecurity firm Group-IB detailed in two recent analyzes attack chain which used fake Windows and macOS video conferencing programs masquerading as MiroTalk and FreeConference.com to infiltrate developers’ systems with BeaverTail and InvisibleFerret.

It should be noted that the fake application is developed using Qt, which supports cross-compilation for both Windows and macOS. The Qt-based version of BeaverTail is capable of stealing browser passwords and collecting data from multiple cryptocurrency wallets.

Cyber ​​security

In addition to sending data to an adversary-controlled server, BeaverTail can download and run the InvisibleFerret backdoor, which includes two components of its own –

  • A core payload that allows infected host fingerprinting, remote control, keylogging, data extortion, and downloading AnyDesk
  • A browser hijacker that collects browser credentials and credit card information

“North Korean threat actors are known to commit financial crimes for funds to support the DPRK regime,” Unit 42 said. “This campaign may be financially motivated as the BeaverTail malware can steal 13 different cryptocurrency wallets.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.