North Korean Hackers Use Fake Crypto Jobs to Spread New RAT Malware

North Korean Hackers Use Fake Crypto Job Offers and Python Malware to Target Indian Job Seekers

  • A North Korean-linked Hacking group is using fake crypto job offers to target job seekers mainly in India.
  • The group deploys Python-based Malware, called “PylangGhost,” to steal credentials for crypto wallets and password managers.
  • Victims are directed to fake job sites and tricked into running harmful commands during bogus interview processes.
  • PylangGhost can steal browser cookies, manage files, take screenshots, and maintain remote access to compromised devices.
  • The attackers focus on individuals with experience in cryptocurrency and blockchain technologies.

A hacking group affiliated with North Korea has targeted job seekers in the cryptocurrency industry using a new malware called "PylangGhost," according to security researchers at Cisco Talos. The group, known as "Famous Chollima" or "Wagemole," has mainly focused its efforts on India by creating fake recruitment campaigns and job sites that imitate legitimate organizations, such as Coinbase and Robinhood, to steal information.

- Advertisement -

The attackers invite victims to participate in job interviews through fraudulent sites and require them to perform technical tasks that secretly install malware on their computers. Cisco Talos reported that this malware, written in Python, enables remote control of the infected device and specifically targets credentials stored in browser extensions, including crypto wallets like MetaMask and password managers such as 1Password and NordPass.

The malicious software, which is a variant of the previously observed GolangGhost RAT, can execute a range of commands once installed. "Based on the advertised positions, it is clear that the Famous Chollima is broadly targeting individuals with previous experience in cryptocurrency and blockchain technologies," the researchers said in their report. The trojan allows attackers to steal cookies and credentials from over 80 different browser extensions, as well as take screenshots, collect system information, and control files on the infected machines.

Victims are typically asked to enable video and camera access for fake interviews, then instructed to run commands under the pretense of installing video drivers. These actions result in system compromise and data theft. Earlier similar campaigns from North Korean-linked groups have also targeted crypto industry employees through fake job and interview processes.

According to Cisco Talos, the code of PylangGhost does not appear to be written with assistance from Artificial Intelligence. In April, hackers linked to the $1.4 billion Bybit theft targeted crypto developers using malware-laden recruitment tests, demonstrating the continued use of this tactic by North Korean-backed threat actors.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

META to Build $10B Indiana Data Center for US AI Push

Meta is investing $10 billion in a new U.S. data center in Indiana to...

Strategy shifts Bitcoin buy plan to focus on preferred stock

Strategy is shifting its capital strategy to fund Bitcoin purchases from common stock sales...

Apple Releases Updates for Exploited Zero-Day Flaw

Apple has released emergency security updates for all major platforms including iOS, macOS, and...

Ethereum Staking Hits New Record: 36.8M ETH Locked

Ethereum's staking ratio has reached a new all-time high, surpassing 30% of its total...

Hoskinson: Midnight Mainnet March, Not for ‘Privacy Maxis’

Cardano founder Charles Hoskinson dismissed targeting privacy-focused communities for Midnight's launch.The new privacy blockchain...

Must Read

7 Best NFT Marketplaces for Every Need

Open Sea | Pianity | Foundation | Magic Eden | SuperRare | Rarible | Theta Drop | Other Platforms | About NFTs | FAQ...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!