Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers Live Camera Live Camera of Lazarus APT’s Remote Worker Plan
Identity

Researchers Live Camera Live Camera of Lazarus APT’s Remote Worker Plan

userBy userDecember 2, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 2, 2025hacker newsIdentity Theft/Threat Intelligence

A joint investigation led by Mauro Erdrich, founder of BCA LTD, and conducted in collaboration with NorthScan, a threat intelligence company, and ANY.RUN, an interactive malware analysis and threat intelligence solution, revealed a network of remote IT employees tied to one of North Korea’s most persistent intrusion schemes, the Lazarus Group’s famous Chollima division.

For the first time, researchers were able to observe the operators working live, capturing their activities on what is believed to be a real developer’s laptop. However, these machines were fully controlled, long-running sandbox environments created by ANY.RUN.

How it works: Recruit and then let them join the company

Screenshot of a message from a recruiter offering a fake job offer

The operation began when NorthScan’s Heiner García used the alias “Aaron” (also known as “Blaze”) to impersonate a U.S. developer targeted by Lazarus recruiters.

Blaze tried to hire a fake developer as a front man under the guise of a job placement “business.” A known Chillima tactic used to recruit North Korean IT workers into Western companies, primarily in the finance, cryptocurrency, healthcare, and engineering sectors.

Interview flow

This scheme followed a well-known pattern.

Steal or borrow identities, use AI tools to pass interviews and share answers, work remotely via victims’ laptops, and repatriate salaries to North Korea.

The team moved to Phase 2 when Blaze requested full access, including SSN, ID, LinkedIn, Gmail, and 24/7 laptop availability.

Trap: A “laptop farm” that wasn’t real

A secure virtual environment provided by ANY.RUN’s interactive sandbox

Instead of using a real laptop, Mauro Eldritch of BCA LTD deployed an ANY.RUN Sandbox virtual machine. Each virtual machine is configured like a fully active personal workstation with usage history, developer tools, and US residential proxy routing.

The team could also force crashes, adjust connections, and take snapshots of every movement without alerting operators.

What they found inside the famous Cholima toolkit

The sandbox session exposed a lean and effective toolset built for identity takeover and remote access, not malware deployment. When the Chrome profile was synced, the operator loaded:

AI-powered job automation tools (Simplify Copilot, AiApply, Final Round AI) automatically fill out application forms and generate interview responses. A browser-based OTP generator (OTP.ee / Authenticator.cc) to handle the victim’s 2FA after identity documents have been collected. Google Remote Desktop. Configured via PowerShell with a fixed PIN, providing permanent control of the host. Regular system reconnaissance (dxdiag, systeminfo, whoami) to validate hardware and environment. Connections are consistently routed through Astrill VPN, a pattern associated with previous Lazarus infrastructure.

In one session, the operator left a notepad message asking “developers” to upload their ID, SSN, and bank account details, confirming the goal of the operation to take over complete identities and workstations without introducing any malware.

A warning to companies and recruitment teams

Remote employment has become a quiet but reliable entry point for identity-based threats. Attackers often reach organizations by targeting individual employees and sending seemingly legitimate interview requests. Once they get inside, the risk extends far beyond a single employee’s intrusion. Intruders gain access to internal dashboards, sensitive business data, and manager-level accounts that impact real-world operations.

Raising internal awareness and providing your team with a safe place to check for anything suspicious can be the difference between aborting an approach early or dealing with a full-blown internal breach later.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGlassWorm returns with 24 malicious extensions masquerading as popular developer tools
Next Article Mistral approaches major AI rivals with new Openweight Frontier and smaller models
user
  • Website

Related Posts

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.