A subgroup of the North Korea-linked hacker group Lazarus arrange three shell corporations, two within the US, to ship malware to unsuspecting customers.
The three sham crypto consulting corporations — BlockNovas, Angeloper Company and SoftGlide — are being utilized by the North Korean hacker group Contagious Interview to distribute malware via pretend job interviews, Silent Push Menace Analysts mentioned in an April 24 report.
Silent Push senior menace analyst Zach Edwards mentioned in an April 24 assertion to X that two shell corporations are registered as reputable companies in the US.
“These web sites and an enormous community of accounts on hiring / recruiting web sites are getting used to trick individuals into making use of for jobs,” he mentioned.
“In the course of the job software course of an error message is displayed as somebody tries to file an introduction video. The answer is a straightforward click on repair copy and paste trick, which ends up in malware if the unsuspecting developer completes the method.”
Three strains of malware — BeaverTail, InvisibleFerret and Otter Cookie — are getting used based on Silent Push.
BeaverTail is malware primarily designed for info theft and to load additional levels of malware. OtterCookie and InvisibleFerret primarily goal delicate info, together with crypto pockets keys and clipboard information.
Silent Push analysts mentioned within the report that hackers use GitHub, job itemizing’s and freelancer web sites to search for victims.
AI used to create pretend staff
The ruse additionally includes the hackers utilizing AI-generated photographs to create profiles of staff for the three entrance crypto corporations and stealing photographs of actual individuals.
“There are quite a few pretend staff and stolen photographs from actual individuals getting used throughout this community. We’ve documented among the apparent fakes and stolen photographs, but it surely’s essential to understand that the impersonation efforts from this marketing campaign are completely different,” Edwards mentioned.
“In one of many examples, the menace actors took an actual picture from an actual particular person, after which appeared to have run it via an AI picture modifier software to create a subtly completely different model of that very same picture.”
Associated: Pretend Zoom malware steals crypto whereas it’s ‘caught’ loading, person warns
This malware marketing campaign has been ongoing since 2024. Edwards says there are identified public victims.
Silent Push recognized two builders focused by the marketing campaign; certainly one of them reportedly had their MetaMask pockets compromised.
The FBI has since shut down not less than one of many corporations.
“The Federal Bureau of Investigation (FBI) acquired the Blocknovas area, however Softglide remains to be dwell, together with a few of their different infrastructure,” Edwards mentioned.
Not less than three crypto founders have reported in March that they foiled an try from alleged North Korean hackers to steal delicate information via pretend Zoom calls.
Teams such because the Lazarus Group are the prime suspects in among the greatest cyber thefts in Web3, together with the Bybit $1.4 billion hack and the $600 million Ronin community hack.
Journal: Lazarus Group’s favourite exploit revealed — Crypto hacks evaluation