North Korean Hackers Use Fake Crypto Jobs to Spread New RAT Malware

North Korean Hackers Use Fake Crypto Job Offers and Python Malware to Target Indian Job Seekers

  • A North Korean-linked Hacking group is using fake crypto job offers to target job seekers mainly in India.
  • The group deploys Python-based Malware, called “PylangGhost,” to steal credentials for crypto wallets and password managers.
  • Victims are directed to fake job sites and tricked into running harmful commands during bogus interview processes.
  • PylangGhost can steal browser cookies, manage files, take screenshots, and maintain remote access to compromised devices.
  • The attackers focus on individuals with experience in cryptocurrency and blockchain technologies.

A hacking group affiliated with North Korea has targeted job seekers in the cryptocurrency industry using a new malware called "PylangGhost," according to security researchers at Cisco Talos. The group, known as "Famous Chollima" or "Wagemole," has mainly focused its efforts on India by creating fake recruitment campaigns and job sites that imitate legitimate organizations, such as Coinbase and Robinhood, to steal information.

- Advertisement -

The attackers invite victims to participate in job interviews through fraudulent sites and require them to perform technical tasks that secretly install malware on their computers. Cisco Talos reported that this malware, written in Python, enables remote control of the infected device and specifically targets credentials stored in browser extensions, including crypto wallets like MetaMask and password managers such as 1Password and NordPass.

The malicious software, which is a variant of the previously observed GolangGhost RAT, can execute a range of commands once installed. "Based on the advertised positions, it is clear that the Famous Chollima is broadly targeting individuals with previous experience in cryptocurrency and blockchain technologies," the researchers said in their report. The trojan allows attackers to steal cookies and credentials from over 80 different browser extensions, as well as take screenshots, collect system information, and control files on the infected machines.

Victims are typically asked to enable video and camera access for fake interviews, then instructed to run commands under the pretense of installing video drivers. These actions result in system compromise and data theft. Earlier similar campaigns from North Korean-linked groups have also targeted crypto industry employees through fake job and interview processes.

According to Cisco Talos, the code of PylangGhost does not appear to be written with assistance from Artificial Intelligence. In April, hackers linked to the $1.4 billion Bybit theft targeted crypto developers using malware-laden recruitment tests, demonstrating the continued use of this tactic by North Korean-backed threat actors.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

New RFP Guide for AI Governance & Usage Control

Security leaders have new budgets for AI security but often lack clear requirements for...

China Pushes Banks to Buy Dollars, Curb Surging Yuan

The People’s Bank of China is urging state-run banks to purchase more US dollars...

US Lags on Fast-Growing Tokenization Oversight

Tokenization is rapidly moving traditional financial assets onto blockchains, moving digital assets from speculation...

US to Allow Crypto Perpetual Futures Within Weeks: CFTC

CFTC Chair Mike Selig announced plans to bring perpetual futures trading to the U.S....

Standard Chartered Appoints Naveen Mallela Global Head of Payments

Standard Chartered has consolidated its payment divisions and appointed Naveen Mallela as Global Head...

Must Read

14 Ways On How to Make Money with Cryptocurrency

Many people want to make money with cryptocurrency because they have heard the success stories of people who became millionaires from zero.If you...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!