Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korea’s ‘PurpleBravo’ campaign targets 3,136 IP addresses with fake job interviews
Identity

North Korea’s ‘PurpleBravo’ campaign targets 3,136 IP addresses with fake job interviews

userBy userJanuary 21, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

As many as 3,136 individual IP addresses have been identified associated with possible targets of the Contagious Interview campaign, which claims to include 20 potential victim organizations across the artificial intelligence (AI), cryptocurrency, financial services, IT services, marketing, and software development sectors in Europe, South Asia, the Middle East, and Central America.

This new discovery comes from Recorded Future’s Insikt Group, which tracks a cluster of North Korean threat activity under the name PurpleBravo. The campaign, first documented in late 2023, is also known as CL-STA-0240, DeceptiveDevelopment, DEV#POPPER, Famous Chollima, Gwisin Gang, Tenacious Pungsan, UNC5342, Void Dokkaebi, and WaterPlum.

The 3,136 individual IP addresses, primarily concentrated around South Asia and North America, are assessed to have been targeted by attackers between August 2024 and September 2025. The 20 affected companies are said to be based in Belgium, Bulgaria, Costa Rica, India, Italy, the Netherlands, Pakistan, Romania, the United Arab Emirates (UAE), and Vietnam.

cyber security

“In some cases, job seekers ran malicious code on company devices, likely exposing them to systemic risk beyond individual targets,” the threat intelligence firm said in a new report shared with Hacker News.

This disclosure comes a day after Jamf Threat Labs detailed significant iterations of the Contagious Interview campaign in which attackers exploited malicious Microsoft Visual Studio Code (VS Code) projects as attack vectors to distribute backdoors, highlighting the continued exploitation of trusted developer workflows to accomplish the twin goals of cyberespionage and financial theft.

The Mastercard-owned company announced that it had detected four LinkedIn personas potentially associated with Purple Bravo posing as developers or recruiters and claiming to be from the Ukrainian city of Odesa, as well as several malicious GitHub repositories designed to distribute known malware families like BeaverTail.

PurpleBravo has also been observed to maintain two different sets of command and control (C2) servers for BeaverTail, a JavaScript infostealer and loader, and a Go-based backdoor known as GolangGhost (also known as FlexibleFerret or WeaselStore), which is based on the HackBrowserData open source tool.

C2 servers are hosted on 17 different providers and managed from Chinese IP ranges via Astrill VPN. The use of Astrill VPN in cyberattacks by North Korean attackers has been well-documented for many years.

It’s worth pointing out that Contagious Interview is complementary to a second separate campaign called Wagemole (aka PurpleDelta). In this campaign, IT employees affiliated with Hermit Kingdom seek unauthorized employment with organizations based in the United States and other parts of the world under fraudulent or stolen identities for both financial gain and espionage.

cyber security

Although the two clusters are treated as different sets of activities, there are significant tactical and infrastructure overlaps between them, despite the fact that threats to IT workers have been around since 2017.

“This includes administrative traffic from a likely PurpleBravo operator displaying activity consistent with that of North Korean IT personnel, a Russian IP address associated with North Korean IT personnel communicating with the PurpleBravo C2 server, and the same Astrill VPN IP address associated with PurpleDelta activity,” Recorded Future said.

To make matters worse, it turns out that candidates who were offered fictitious jobs by PurpleBravo took coding assessments on company-issued devices, effectively compromising their employers in the process. This highlights that the IT software supply chain is “equally vulnerable” to intrusions from North Korea’s adversaries other than IT workers.

“Many of these [potential victim] “The organization touts a large customer base, posing serious supply chain risks to companies that outsource operations in these regions. While the threat of North Korean IT worker employment is widely known, PurpleBravo’s supply chain risks also deserve equal attention as they help organizations prepare for, defend against, and prevent the leakage of sensitive data to North Korean threat actors,” the company said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA giant freshwater reservoir discovered off the East Coast is 20,000 years old and could be large enough to supply New York City for 800 years.
Next Article Stunning time-lapse video shot using ‘artificial solar eclipses’ shows three massive eruptions of the sun
user
  • Website

Related Posts

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026

Experts detect Pakistan-linked cyber attack targeting Indian government agencies

January 27, 2026

ClickFix attack spreads using fake CAPTCHAs, Microsoft Scripts, and trusted web services

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Android smartphones are getting more anti-theft features

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.