N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware

N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware

October 9, 2024 at 10:42AM

North Korean threat actors are targeting tech job seekers with malware through a campaign called “Contagious Interview.” The group poses as employers, enticing victims to download malicious applications like BeaverTail and InvisibleFerret, designed to steal sensitive data. This ongoing threat highlights financial motivations behind their cyber activities.

**Meeting Notes Takeaways (Oct 09, 2024 – Ravie Lakshmanan)**

1. **Threat Overview**: North Korean threat actors (CL-STA-0240) are targeting tech job seekers with updated malware, specifically BeaverTail and InvisibleFerret, as part of a campaign called “Contagious Interview.”

2. **Attack Methodology**:
– The attackers pose as potential employers on job search platforms.
– Victims are invited to online interviews, during which they are coerced into downloading malware.
– The initial infection occurs via BeaverTail, which acts as a downloader and information stealer for both Windows and macOS systems, leading to the installation of the InvisibleFerret backdoor.

3. **Malware Capabilities**:
– **BeaverTail**: Steals browser passwords, harvests cryptocurrency wallet data, exfiltrates this information to adversary-controlled servers, and can download InvisibleFerret.
– **InvisibleFerret**: Includes two components:
– A main payload for remote access, keylogging, data exfiltration, and AnyDesk downloading.
– A browser stealer that collects credentials and credit card information.

4. **Recent Findings**:
– Security researchers (Patrick Wardle & Group-IB) noted fake Windows and macOS video conferencing apps (impersonating MiroTalk and FreeConference.com) were utilized for malware delivery.
– These bogus applications were developed using Qt, which allows cross-compilation for both operating systems.

5. **Ongoing Threat**: Despite public awareness, the campaign remains active, successfully enticing developers into executing malicious code under false pretenses of coding tasks.

6. **Financial Motivation**: The operation is believed to be financially motivated, with BeaverTail being capable of stealing funds from 13 different cryptocurrency wallets to support the DPRK regime.

*For further updates, follow on Twitter and LinkedIn.*

Full Article