North Korean Hackers Use Fake Crypto Jobs to Spread New RAT Malware

North Korean Hackers Use Fake Crypto Job Offers and Python Malware to Target Indian Job Seekers

  • A North Korean-linked Hacking group is using fake crypto job offers to target job seekers mainly in India.
  • The group deploys Python-based Malware, called “PylangGhost,” to steal credentials for crypto wallets and password managers.
  • Victims are directed to fake job sites and tricked into running harmful commands during bogus interview processes.
  • PylangGhost can steal browser cookies, manage files, take screenshots, and maintain remote access to compromised devices.
  • The attackers focus on individuals with experience in cryptocurrency and blockchain technologies.

A hacking group affiliated with North Korea has targeted job seekers in the cryptocurrency industry using a new malware called "PylangGhost," according to security researchers at Cisco Talos. The group, known as "Famous Chollima" or "Wagemole," has mainly focused its efforts on India by creating fake recruitment campaigns and job sites that imitate legitimate organizations, such as Coinbase and Robinhood, to steal information.

- Advertisement -

The attackers invite victims to participate in job interviews through fraudulent sites and require them to perform technical tasks that secretly install malware on their computers. Cisco Talos reported that this malware, written in Python, enables remote control of the infected device and specifically targets credentials stored in browser extensions, including crypto wallets like MetaMask and password managers such as 1Password and NordPass.

The malicious software, which is a variant of the previously observed GolangGhost RAT, can execute a range of commands once installed. "Based on the advertised positions, it is clear that the Famous Chollima is broadly targeting individuals with previous experience in cryptocurrency and blockchain technologies," the researchers said in their report. The trojan allows attackers to steal cookies and credentials from over 80 different browser extensions, as well as take screenshots, collect system information, and control files on the infected machines.

Victims are typically asked to enable video and camera access for fake interviews, then instructed to run commands under the pretense of installing video drivers. These actions result in system compromise and data theft. Earlier similar campaigns from North Korean-linked groups have also targeted crypto industry employees through fake job and interview processes.

According to Cisco Talos, the code of PylangGhost does not appear to be written with assistance from Artificial Intelligence. In April, hackers linked to the $1.4 billion Bybit theft targeted crypto developers using malware-laden recruitment tests, demonstrating the continued use of this tactic by North Korean-backed threat actors.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Omnichain USDT Launched on Hedera for Seamless Liquidity

USDT0, the omnichain version of Tether's USDT stablecoin, has launched on the Hedera network.The...

Private Credit Crisis May Force Bitcoin Sell-Off: Analysts

The $2 trillion private credit sector faces a crisis from defaults, redemptions, and limited...

Markets Fall as Oil Nears $100 on Continued Middle East War

Create a cryptocurrency news article based on the Most US stocks continued to fall...

Tech Firm Eightco Raises $125M, Adds Tom Lee

Eightco shares rose over 15% after securing a $125 million fundraise from BitMine and...

Ethereum’s Cheap Gas Fuels Scam Spike After Upgrade

The Ethereum Fusaka upgrade on December 3 slashed gas fees but also catalyzed a...

Must Read

26 Best Investment Audiobooks on Audible

Looking to expand your financial knowledge? Me too..When I first started investing, I was completely lost. There were so many terms, strategies, and theories...