Update: Beware of Fake Web3 Job Recruiters Stealing Crypto

Update: Beware of Fake Web3 Job Recruiters Stealing Crypto

Reinout te Brake | 09 Oct 2024 16:15 UTC

Fake Recruiters Associated with North Korea Target Crypto Owners in Job Scam

Recently, fake Web3 job recruiters connected to North Korea have been preying on job-seekers online, deceiving them into downloading malware disguised as a video call application, ultimately stealing their Cryptocurrency. According to a recent report by the cyber risk team Unit 42 from Palo Alto Networks, this new variant of malware targets both Windows and macOS systems and is now capable of pilfering Crypto from 13 different Wallets, including MetaMask, BNB Chain, Exodus, and more.

North Korean Threat Actors and Their Motivations

The researchers behind the investigation believe that these malicious actors are financially driven, likely serving to support the regime in the Democratic People’s Republic of Korea (DPRK).

Understanding How the Scam Operates

The attackers pinpoint Tech industry job seekers as their primary targets. They reach out to Software developers through job Platforms, inviting them to participate in online interviews. Subsequently, they coerce the developers into downloading and installing malware disguised as a video chat application.

Once the malware is executed, it lurks in the background, collecting Digital Assets and sensitive Data surreptitiously. This tactic has been seen in various scams, including those on popular platforms like GitHub and LinkedIn Premium.

One particular case cited in the report involved a developer being contacted by a fake recruiter via LinkedIn Premium. The recruitment attempt eventually led to the discovery of the malicious code, highlighting the sophisticated tactics employed by these threat actors.

Evolution of the Malware—From 9 to 13 Wallets

Unit 42 has been monitoring the activities of these malicious actors for an extended period, starting with the "Contagious Interview campaign" in November 2023. The campaign has witnessed subsequent upgrades, with advancements in both the BeaverTail downloader and the InvisibleFerret backdoor malware.

The new version of the BeaverTail malware, particularly designed to steal Cryptocurrency wallets, is now capable of targeting 13 different Crypto wallet extensions across various platforms. This increased reach highlights the continuous evolution of these cyber threats.

Moreover, the introduction of the InvisibleFerret backdoor allows the attackers to retain control over infected devices, facilitating the extraction of sensitive company information.

Protecting Against Advanced Social Engineering Strategies

Given the sophisticated nature of these scams, both individuals and organizations are urged to remain vigilant. Unit 42 suggests implementing protection and mitigation measures to safeguard against potential infiltrations by these threat actors.

By staying informed and adopting proactive Security measures, individuals can reduce the risks associated with these advanced social engineering campaigns.

It's essential to exercise caution while interacting with unknown parties online, especially when sharing personal information or downloading unfamiliar files. Awareness and diligence are key components in protecting oneself from falling victim to such malicious schemes.

Wil je op de hoogte blijven van Play-to-Earn-spellen?

Schrijf je nu in voor onze wekelijkse nieuwsbrief.

Bekijk meer

Play-to-Earn Games: Beste Blockchain Game-lijst voor NFTs en Crypto

Play-to-Earn Game-lijst
Geen verplichtingenGratis te gebruiken