Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-related salt typhoons exploit critical Cisco vulnerabilities to target Canadian communications

Court filings reveal early work of Openai and IO on AI devices

Tesla’s Robotaxis is already attracting attention from federal safety regulators

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Targeted cryptographic developers for Python malware spoofing coding challenges
Identity

Targeted cryptographic developers for Python malware spoofing coding challenges

userBy userApril 15, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Python malware disguised as coding challenges

North Korea-related threat actors, rated as behind the massive Buybit Hack in February 2025, are linked to malicious campaigns targeting developers to deliver new steeler malware under the guise of coding assignments.

This activity is attributed to a hacking group that slowly tracks as Pisces, also known as Jade Suite, Puk Chong, Trader Tri-writer, UNC4899, by Palo Alto Network Unit 42.

“The late Pisces, who worked with LinkedIn’s cryptocurrency developer, sends malware disguised as coding challenges, poses as a potential employer,” said security researcher Prashil Pattni. “These challenges require developers to run compromised projects and infect their systems with malware they call RN Loader and RN Steelers.”

Slow Pisces has a history of targeting developers in the cryptocurrency sector, and approach them on LinkedIn as part of the expected job opportunities and tempt them to open PDF documents detailing coding assignments hosted on GitHub.

Cybersecurity

In July 2023, Github revealed that employees working for blockchain, cryptocurrency, online gambling and cybersecurity companies had been chosen by threat actors to deceive them to run malicious NPM packages.

Then last June, Google-owned Mandiant could go into detail about the attacker’s tactics that first send benign PDF documents containing job statements on LinkedIn for suspected employment opportunities, and follow a skill survey if they express their interest.

The survey included instructions for completing the coding challenge by downloading the Trojanized Python project from Github. It is designed to contact a remote server to obtain an unspecified second stage payload, although it can be displayed on the surface of the cryptocurrency price, if certain conditions are met.

The multi-stage attack chain documented by unit 42 follows the same approach. Malicious payloads are only sent to validated targets, probably based on IP address, geolocation, time, and HTTP request headers.

“In contrast to a wide range of phishing campaigns, by focusing on individuals contacted via LinkedIn, the group can provide tighter control over the later stages of the campaign and deliver payloads only to anticipated victims,” ​​says Pattni. “To avoid suspicious evaluation and exec functionality, Pisces slowly uses yaml deintervention to run the payload.”

The payload is configured to run a malware family named RN Loader. This will send basic information about the victim machine and operating system to the same server via HTTPS, receiving and executing the next stage Base64 encoded BLOB.

The newly downloaded malware is RN Stealer, an information steeler that can harvest sensitive information from infected Apple MACOS systems. This includes top-level content for system metadata, installed applications, directory listings, and victim’s home directory, iCloud keychain, SSH key storage, and configuration files for AWS, Kubernetes, and Google Cloud.

Cybersecurity

“Infostealer will gather more detailed victim information. It is likely that the attackers were used to determine whether continuous access was required,” Unit 42 said.

Similarly, target victims who apply for JavaScript roles will be encouraged to download the “Cryptocurrency Dashboard” project from GitHub. This employs a similar strategy in which the Command and Control (C2) server provides additional payloads only if the target meets certain criteria. However, the exact nature of the payload is unknown.

“The repository uses an embedded JavaScript (EJS) template tool and passes the response to the ejs.render() function from the C2 server,” Pattni pointed out. “Like the use of yaml.load(), this is another technique that Pisces slowly uses to hide the execution of arbitrary code from the C2 server. This method is only apparent when viewing a valid payload.”

Jade’s school is one of many North Korean threat activity clusters that utilize employment opportunity-themed lures as malware distributor vectors, others are dream jobs, infectious interviews, and fascinating Pisces.

“These groups do not have operational overlap, but these campaigns using similar early infection vectors are noteworthy,” Unit 42 concluded. “Slow Pisces stands out from their fellow campaigns in operational security. Payload delivery at each stage is in memory only, and touring in subsequent stages of the group will be deployed as needed.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAE will boost the leadership team with the name “big hitter”
Next Article Searcy to serve at the National Gallery during a £805 million investment
user
  • Website

Related Posts

China-related salt typhoons exploit critical Cisco vulnerabilities to target Canadian communications

June 24, 2025

The Digital Twin Revolution: Reshaping Industry 4.0

June 23, 2025

Echo Chamber Jailbreak Tricks LLMS To generate harmful content like Openai and Google

June 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-related salt typhoons exploit critical Cisco vulnerabilities to target Canadian communications

Court filings reveal early work of Openai and IO on AI devices

Tesla’s Robotaxis is already attracting attention from federal safety regulators

The Digital Twin Revolution: Reshaping Industry 4.0

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.