Skip to content
  • Home
  • Emerging Technology & News
  • Computer Help
  • Privacy and Security
  • Reimage Windows Repair
The Reimage Blog
Menu
  • Home
  • Emerging Technology & News
  • Computer Help
  • Privacy and Security
  • Reimage Windows Repair
Facebook Twitter
Home  /  Privacy and Security  /  North Korean hackers are posing as job interviewers - don’t be fooled
PostedinPrivacy and Security Posted on November 23, 2023

North Korean hackers are posing as job interviewers - don’t be fooled

Posted By Matthew.England

You won’t get a job - but you might get a virus

If you’re hiring, or looking to get hired for a new job - be very careful who you talk to. Cybersecurity researchers from Palo Alto’s Unit 42 have discovered two separate malware campaigns - one targeting employers, and the other job hunters - run by North Korean state-sponsored threat actors.

Dubbed “Contagious Interview”, the campaign sees hackers impersonate employers, creating fake profiles on various social media networks and try to get software developers interested in a new job opportunity. 

During the interview process (which often includes multiple steps, possibly even video interviews), the hackers would get the victims to download and run files which end up infecting their endpoints with malware.

New malware

This campaign most likely started in December last year, and given that parts of the infrastructure are still active, the campaign is still very much a threat. 

Its goal, according to the report, is to steal cryptocurrencies from the victims, and later use their endpoints as a stepping stone for additional attacks.

The campaign in which hackers seek employment is dubbed “Wagemole”. The threat actors are mostly going for US-based firms, Unit 42 says, but they won’t pass up on an opportunity anywhere else in the world. During the process, the attackers create multiple resumes with different technical skill sets, as well as multiple identities impersonating individuals from different parts of the world. It also includes common job interview questions and answers, scripts 

For the attack to be successful, the victims need to download and run two types of previously unseen malware - one called BeaverTail, and the other one called InvisibleFerret. While BeaverTail is a JavaScript-based piece of malware hidden inside an npm package, InvisibleFerret is a “simple but powerful” Python-based backdoor. Both samples can be run on Windows, macOS, and Linux devices.

Written by: Sead Fadilpašić
Source: TechRadar.com
Featured Image: TheDigitalArtist / Pixabay

Share on Facebook Share on Twitter
Previous Article
Hands on with Google’s new Titan Security Keys - and why they still have their place
Next Article
Be careful: There are reports of nasty bugs with the latest Windows 11 update

About Author

Matthew.England

Related Posts

  • Even wireless tools aren’t safe from ransomware attacks

    January 11, 2024
  • Google Chrome starts blocking data tracking cookies

    January 8, 2024
  • Apple now requires court orders in U.S. to access push notification data

    December 15, 2023
Scan Now

Categories

  • Business
  • Computer Help
  • Emerging Technology & News
  • Privacy and Security
  • Reviews

Reviews

Reimage Social

Security

Popular Posts

  • PCWorld calls Reimage “A Fantastic Repair Utility “ July 26, 2011 Reviews
  • 4 Ways to Keep the Ghouls & Goblins Away From Your PC October 26, 2010 Archive
  • The PC Key to Happiness - A Properly Maintained OS September 2, 2010 Archive
  • Google says hacked websites were attacking iPhones for years September 12, 2019 Privacy and Security

Random Posts

  • How to Completely Remove Your Online Presence August 9, 2023 Privacy and Security
  • Latest owner of BlackBerry smartphone branding cancels planned 5G phone, shuts down February 22, 2022 Business
  • Microsoft Asks Windows Users to Share Potentially Insecure Drivers December 13, 2021 Privacy and Security
  • Clearview AI is looking to expand globally, report says February 6, 2020 Emerging Technology & News
© Copyright 2019
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok