Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

North Korean agents impersonate experts on LinkedIn to infiltrate companies

Google expands tools to help users remove sensitive data about themselves from searches

India orders social media platforms to quickly remove deepfakes

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean agents impersonate experts on LinkedIn to infiltrate companies
Identity

North Korean agents impersonate experts on LinkedIn to infiltrate companies

userBy userFebruary 10, 2026No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Information technology (IT) employees associated with the Democratic People’s Republic of Korea (DPRK) are now applying for remote jobs using the real LinkedIn accounts of impersonated individuals, marking a new expansion of fraud.

“These profiles often include verified work emails and ID badges, which North Korean operatives hope will make fraudulent applications appear legitimate,” the Security Alliance (SEAL) said in a series of posts on X.

The threat to IT workers is a long-running North Korean operation in which North Korean agents pose as remote workers and use stolen or fabricated identities to secure jobs at Western companies and elsewhere. This threat is also tracked by the broader cybersecurity community, including Jasper Sleet, PurpleDelta, and Wagemole.

The ultimate goal of these efforts is two-pronged. One is to generate a steady source of income to fund a country’s weapons program, one is to conduct espionage by stealing sensitive data, and in some cases go further by demanding ransom to avoid information leakage.

Cybersecurity firm Silent Push last month described North Korea’s remote worker program as a “massive revenue stream” for the regime, saying it also allows threat actors to gain administrative access to sensitive codebases and establish a permanent presence within corporate infrastructure.

“Once their salaries are paid, North Korean IT workers transfer cryptocurrencies through various money laundering methods,” blockchain analysis firm Chainalysis said in a report released in October 2025.

“One of the ways IT officials and money launderers sever the link between the source and destination of on-chain funds is through chain hopping or token swapping. They utilize smart contracts, such as decentralized exchanges and bridge protocols, to complicate the tracking of funds.”

To combat this threat, individuals who suspect their identity has been used for fraudulent job applications should consider posting a warning on their social media accounts, as well as listing official communication channels and contact verification methods (such as company email).

“Always verify that the account a candidate lists is controlled by the email provided by the candidate,” the Security Alliance said. “A simple check, such as asking us to connect with you on LinkedIn, confirms ownership and control of your account.”

The disclosure comes after the Norwegian Police and Security Service (PST) issued an advisory saying it was aware of “several cases” of Norwegian companies being affected by the IT workers scheme over the past year.

PST said last week that “companies were likely deceived into hiring North Korean IT workers to work from home.” “The salary income that North Korean employees receive through such positions would likely be used to fund the country’s weapons and nuclear weapons program.”

Running parallel to the IT workforce plan is another social engineering campaign called “contagion interviewing.” This involves using a fake recruitment flow to approach potential targets with a job offer on LinkedIn, then lure them into an interview. The malicious phase of the attack begins when an individual claiming to be a recruiter or hiring manager instructs the target to complete a skills assessment, which ultimately leads to the execution of malicious code.

In one case of a spoof recruitment campaign targeting high-tech workers using a hiring process similar to that of digital asset infrastructure company Fireblocks, threat actors allegedly asked candidates to clone a GitHub repository and run a command that installed an npm package that triggered execution of malware.

“This campaign also employs EtherHiding, a new technology that utilizes blockchain smart contracts to host and obtain command and control infrastructure, making it more resistant to removal of malicious payloads,” said security researcher Ori Hershko. “These steps triggered the execution of malicious code hidden within the project. The setup process downloaded and executed malware onto the victim’s system, giving the attacker a foothold on the victim’s machine.”

Abstract Security and OpenSourceMalware report that in recent months, new variants of the Contagious Interview campaign have been observed using malicious Microsoft VS Code task files to execute JavaScript malware disguised as web fonts, ultimately leading to the deployment of BeaverTail and InvisibleFerret, allowing persistent access and theft of cryptocurrency wallets and browser credentials.

Coremos RAT Campaign

Another variant of the intrusion set documented by Panther is suspected of using a malicious npm package to deploy a modular JavaScript remote access Trojan (RAT) framework called Koalemos through a loader. RATs are designed to enter a beacon loop, retrieve tasks from external servers, execute them, send encrypted responses, and sleep at random time intervals before repeating again.

It supports 12 different commands to perform file system operations, transfer files, execute discovery instructions (such as whoami), and execute arbitrary code. The names of some packages associated with activities are:

env-workflow-test sra-test-test sra-testing-test vg-medallia-digital vg-ccc-client vg-dev-env

“The initial loader performs DNS-based execution gate and engagement date validation before downloading and spawning the RAT module as a separate process,” said security researcher Alessandra Rizzo. “Koalemos performs system fingerprinting, establishes encrypted command and control communications, and provides full remote access capabilities.”

Labyrinth Senriuma will be divided into specialized operational units.

The development comes as it was revealed that a prolific North Korean hacking collective known as Labyrinth Chollima has evolved into three separate clusters with distinct objectives and tradecraft. namely, the core Labyrinth Chollima group, Golden Chollima (aka AppleJeus, Citrine Sleet, UNC4736), and Pressure Chollima (aka Jade Sleet, TraderTraitor, UNC4899).

It is worth noting that according to DTEX evaluation, Labyrinth Chollima, along with Andariel and BlueNoroff, is considered a subcluster within the Lazarus group (aka Diamond Sleet and Hidden Cobra), and BlueNoroff has split into TraderTraitor and CryptoCore (aka Sapphire Sleet).

Despite their newfound independence, these adversaries continue to share tools and infrastructure, suggesting centralized coordination and resource allocation within North Korea’s cyber apparatus. Golden Chollima focuses on consistent small-scale cryptocurrency theft in economically developed regions, while Pressure Chollima singles out organizations with large amounts of digital assets and pursues high-value heists using sophisticated implants.

New North Korea cluster

Labyrinth Chollima’s activities, on the other hand, are motivated by cyber espionage, using tools such as the FudModule rootkit to achieve stealth. The latter is also believed to be the result of Operation Dream Job, another Job-centric social engineering campaign aimed at distributing malware for information gathering purposes.

“The sharing of infrastructure elements and cross-pollination of tools shows that these sectors remain closely aligned,” CrowdStrike said. “All three attackers are using very similar techniques, including supply chain compromises, HR-themed social engineering campaigns, trojanized legitimate software, and malicious Node.js and Python packages.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle expands tools to help users remove sensitive data about themselves from searches
user
  • Website

Related Posts

Reynolds ransomware embeds BYOVD drivers that disable EDR security tools

February 10, 2026

Inside the rise of the digital parasite

February 10, 2026

ZAST.AI raises $6M in Pre-A to scale AI-powered code security with “zero false positives”

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

North Korean agents impersonate experts on LinkedIn to infiltrate companies

Google expands tools to help users remove sensitive data about themselves from searches

India orders social media platforms to quickly remove deepfakes

Reynolds ransomware embeds BYOVD drivers that disable EDR security tools

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.