Recent reports have revealed that a subgroup of the notorious North Korea-linked hacking collective, Lazarus Group, has established a network of fake companies to distribute malware targeting job seekers in the cryptocurrency sector. This alarming development raises concerns about cybersecurity and the risks faced by individuals navigating the job market in the digital age.

Fake Companies Used for Malware Distribution

According to Silent Push, a cybersecurity firm, the three fraudulent crypto consulting firms—BlockNovas, Angeloper Agency, and SoftGlide—are being exploited by the North Korean hacking group known as Contagious Interview to spread malware. These companies, two of which are registered in the United States, have been designed to deceive potential job applicants, as detailed in an April 24 report.

“These websites and a vast network of accounts on hiring and recruiting platforms are being used to mislead individuals into applying for jobs,” stated Zach Edwards, a senior threat analyst at Silent Push, in an April 24 statement. He elaborated that during the application process, victims encounter an error message while attempting to record an introduction video. The supposed solution involves a simple click-and-copy action, which inadvertently leads to malware installation when applicants follow through.

During the sham job interview, an error message prompts users to click, copy, and paste to fix it, leading to malware infection. Source: Zach Edwards

Malware Types and Tactics

Silent Push reported that the hackers are utilizing three specific strains of malware—BeaverTail, InvisibleFerret, and Otter Cookie. BeaverTail primarily focuses on information theft and deploying additional malware stages, while OtterCookie and InvisibleFerret target sensitive data such as cryptocurrency wallet keys and clipboard information.

You may also like :  These 10 Memecoins Headed to Trump's Crypto Wallet Are Set to Soar This November

The report also noted that the attackers are leveraging GitHub job listings and freelancer platforms to identify potential victims.

Adding to the deception, the hackers have employed AI-generated images to fabricate profiles of nonexistent employees for the fraudulent companies. Edwards remarked, “Numerous fake employees and stolen images from real people populate this network. We’ve documented some of the obvious falsifications, underscoring the severity of their impersonation efforts.” He referenced instances where authentic photographs were modified using AI tools to create subtly different versions.

This ongoing malware campaign has been traced back to at least 2024, with specific victims already reported by Silent Push, including a developer whose MetaMask wallet was compromised. In a significant law enforcement action, the FBI has successfully shut down at least one of the fraudulent companies involved in the scheme. Edwards indicated that while the FBI acquired the BlockNovas domain, SoftGlide and some other infrastructure remain operational.

Cryptocurrencies, Hackers, North Korea, Cybersecurity
Source: Zach Edwards

In March, at least three cryptocurrency founders reported thwarting attempts by suspected North Korean hackers to extract sensitive information through fraudulent Zoom calls. The Lazarus Group, associated with some of the most significant cyber heists in the Web3 space—including the notorious hacks of Bybit and the Ronin network—continues to pose a significant threat to the industry, complicating the landscape for cybersecurity efforts.

Magazine: Lazarus Group’s Favorite Exploit Revealed — Crypto Hacks Analysis