web analytics
Home » Technology » Pseudo-employment tests: North Korean hackers target developers

Pseudo-employment tests: North Korean hackers target developers

North Korean hackers are currently trying to hijack developers’ computers. To do this, they are setting up supposed settings tests. During these, the victim is tricked into installing malware that gives the attackers control over the respective system.

Malware under time pressure

As security researcher Karlo Zanki of ReversingLabs reported the attacks now discovered are part of a larger operation targeting developers. This has been running in various variants since August 2023. There are indications that the North Korean Lazarus group is behind it. In the latest operation, Python programmers are the main target.

The attackers contact the targets on platforms such as LinkedIn and convince them to download manipulated packages from public repositories such as npm, PyPI or their own GitHub accounts. Zanki explains that ReversingLabs has discovered malicious code in modified versions of legitimate Python libraries such as “pyperclip” and “pyrebase”. This uses a Base64-encoded string to disguise a downloader that contacts a command and control server (C2) to execute malicious commands.

Particularly perfidious are the fake coding tests that the attackers disguise as part of an application process. For example, supposed applicants are asked to run a Python project provided in a ZIP file within five minutes and then fix an error within 15 minutes. This time pressure increases the likelihood that the developers will run the package without first performing a security or code check.

Some of these tests pretend to be technical interviews for well-known financial institutions such as “Capital One” and “Rookery Capital Limited” to make the deception more believable. It is currently unclear how widespread this campaign is, but targeted attacks via platforms such as LinkedIn have already been confirmed by several security firms.

Many targeted attacks

The hackers’ approach remains sophisticated. After an initial conversation on LinkedIn, a ZIP archive with the disguised malware is sent. The download activates a second malware level that remains on the system and is anchored via “launch agents” and “launch daemons”. These new discoveries are part of a larger wave of North Korean cyber attacks that are also targeting other countries.

The security company Genians has detected an intensification of spear phishing attacks by the “Konni” group against Russia and South Korea. Among other things, new malware such as “CURKON” is being distributed, which serves as a downloader for other malware.

Leave a Reply