Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Mahmoud Khalil has allowed him to hold his newborn son for the first time despite objections from the government

Judge blocks large layoffs for Trump administration in education sector

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Lazarus Group targets job seekers with Clickfix tactics to deploy Golangghost malware
Identity

Lazarus Group targets job seekers with Clickfix tactics to deploy Golangghost malware

userBy userApril 3, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Clickfix Tactic deploys Golangghost malware

The North Korean threat actor behind the infectious interviews adopted Clickfix social engineering tactics, seducing job seekers in the cryptocurrency sector, and providing a previously undocumented Go-based backdoor called Golangghost on Windows and Macos systems.

The new activity, which was rated as a continuation of the campaign, is called a Clickfake interview with French cybersecurity company Sekoia. The infectious interviews, tracked as Deceptividedevelopment, Dev #Popper, and the famous Chollima, are known to have been active since at least December 2022, but only first published in late 2023.

“Use a legal job interview website to leverage Clickfix tactics and install windows and macos backgrounds,” said Sekoia researchers Amaury G., Coline Chavane, and Felix Aimé, belonging to the infamous Lazarus Group.

A notable aspect of the campaign is that it targets mainly centralized financial entities by impersonating companies such as Coinbase, Kucoin, Kraken, Circle, Securitize, Blockfi, Tether, Robinhood, and Bybit, and marking deviations from hacking groups’ distributed financial (DEFI) attacks.

Infectious interviews like Operation Dream Job employ fake jobs as Lure to attract future targets and download malware that can steal cryptocurrency and other sensitive data.

As part of the effort, candidates will approach via LinkedIn or X to prepare for video call interviews. This interview will ask you to download malware-covered video conferencing software or open source projects that activate the infection process.

Cybersecurity

The use of Clickfix tactics by the Lazarus Group was first disclosed by security researcher Taylor Monahan towards the end of 2024, with the attack chain leading to the deployment of a malware family known as Ferret, delivering Golang Backdoor.

In this campaign iteration, victims are asked to visit a video interview service named Willo and complete their own video evaluation.

“The entire setup, meticulously designed to build user trust, goes smoothly until the user is asked to enable the camera,” explained Sekoia. “At this point, you will receive an error message indicating that the user must download the driver to fix the issue. This is where the operator will employ the Clickfix technique.”

The instructions given to the victim to allow access to the camera or microphone will vary depending on the operating system used. On Windows, the target opens a command prompt and is prompted to run the Curl command to run the Visual Basic Script (VBS) file, and launches a batch script that runs Golangghost.

If the victim is accessing the site from a MacOS machine, they will be prompted to launch the terminal app and run the Curl command to run the shell script. The malicious shell script runs a second shell script for that part, resulting in a steeler module called Frostyferret (aka Chromeupdatealert) and a backdoor.

Frostyferret displays a fake window indicating that the Chrome web browser needs to access the user’s camera or microphone, then prompts you to enter your system password. The information entered is surrounded by dropbox locations that are likely to indicate an attempt to access the iCloud keychain using a stolen password, whether it is valid or not.

Golangghost is designed to promote remote control and data theft via several commands that can upload/download files, send host information, and steal data from your web browser.

“We found that all positions have nothing to do with the technical profile in software development,” Sekia said. “They are managers’ jobs that focus primarily on business development, asset management, product development, or decentralized finance professionals.”

“This is a major shift from previous documented campaigns stemming from DPRK-Nexus threat actors, based primarily on fake job interviews targeting developers and software engineers.”

North Korean IT Workers Scheme works in Europe

The development comes as Google Threat Intelligence Group (GTIG) has observed a surge in illicit IT worker schemes in Europe, highlighting a significant expansion of operations beyond the US.

The activities of IT workers involve North Korean citizens pretending to be legitimate remote workers in violation of international sanctions, infiltrating businesses and generating illegal revenues in Pyongyang.

Increased awareness of the activities, coupled with the US Department of Justice indictment, incited “a global expansion of IT workers’ operations,” Google said, noting that it discovered several counterfeit personas seeking employment in various organizations in Germany and Portugal.

It has also been observed that IT workers are carrying out a variety of projects in the UK related to web development, bot development, content management systems (CMS) development, and blockchain technology, often claiming that they are from Italy, Japan, Malaysia, Singapore, Ukraine, the US and Vietnam.

Cybersecurity

This tactic of the workers, pretending to be the Nationals in Vietnam, Japan and Singapore, was highlighted earlier last month by managed intelligence company NISO, pointing to the use of Github to carve new personas and new personas to carve recycled portfolio content.

“European IT workers have been adopted through a variety of online platforms, including Upwork, Telegram and Freelancer,” said Jamie Collier, GTIG’s lead threat intelligence advisor. “Payment for their services was facilitated through cryptocurrency, Transferwise services, and Payoneer, highlighting the use of methods to obfuscate the origins of funds and destinations.”

In addition to using local facilitators to help land work, insider threat manipulation has witnessed the public knowing that since October 2024, these IT workers rely on ransom payments from their employers to free their own data or provide it to competitors.

What appears to be a further evolution of the scheme is said to be that IT workers are currently targeting companies that run customer device (BYOD) policies, as these devices are unlikely to use traditional security and logging tools in enterprise environments.

“Europe needs to wake up quickly. Despite being on the cross of IT workers’ operations, we see this too much as a US problem. The recent changes in North Korea are likely due to the US operational hurdles, indicating the agility of IT workers and the ability to adapt to changing circumstances,” Collier said.

“From rapid targeting and ransomware to cryptocurrency theft and supply chain compromises, there are 10 years of diverse cyberattacks ahead of North Korea’s latest surge. This relentless innovation demonstrates a long-standing commitment to funding the administration through cyber operations.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAI and the 2-day workweek: Bill Gates’ prediction for the next decade
Next Article Qualcomm acquires the Generation AI Division of Vietnamese startup Vinai to enhance the AI ​​capabilities of devices
user
  • Website

Related Posts

Chinese hackers exploit Trimble CityWorks flaws to infiltrate US government networks

May 22, 2025

Critical Windows Server 2025 DMSA vulnerability allows for active directory compromise

May 22, 2025

Chinese hackers exploit Ivanti EPMM bug in global enterprise network attacks

May 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Mahmoud Khalil has allowed him to hold his newborn son for the first time despite objections from the government

Judge blocks large layoffs for Trump administration in education sector

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Kraken opens the digital tokens of Apple, Tesla, nvidia outside us

Trending Posts

Iran says it will hold us accountable for Israel’s attack on nuclear presence | Military News

May 22, 2025

Trump’s Ramaphosa “Ambshell”: Important Takeout from Heated White House Conference | Donald Trump News

May 22, 2025

Tottenham’s defeat of Man UTD focuses on financial distress | Football News

May 22, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Bitcoin will surge beyond $111,000 from $74,508 a month ago amid new optimism

Mantle and Republic Technologies develop strategic partnerships in integrating pioneer institutions

Openai acquires Jony Ive’s AI device startup for $6.5 billion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.