The Lizarus group shows job seekers in LinkedIn with crypto-dybar

The North Kores Group Lazarus Lazarus is a job seekers and trained in the continuous campaign that conducts LinkedIn’s recruitment installation, and present the persistence of Crypto data, and present persistence.

According to the Bitdefureler Labs, the threatening players reached the Fake Linkendin’s demand for the victims to download and to make JavaScript reputation from the perfect place.

“Our investigators noted that Payload is a platform for stealing the platform information that can be included in Windows Systems, Macos and Linux,” said Bitdefender Researchers on a blog blog. “This Foot details are Extered to look at the list of popular Cryptocurrency in view of the Crypto browsing extensions with (list of ID).”

Malalare analysis and operations helped researchers to connect the campaign to the threatened characters of North Korean, directly APT38 based on the previous group campaigns around the political work.

Hackers ran straight to change

It is interesting that the discovery was made available by workers themselves like them, accidentally, sent the work contribution to one of the BightDefecter investigent.

The blog post has added that the campaign started by attracting the message to send a partnership message to participate in Cryptocurrency change. With interest, the recipient is asked for GitTub’s personal link – that may be used for criminal activities – which has led to crime containing the “MVP) project of the Crypto project.

A letter of questions had questions and could be answered only by demo was moved to a saved link, when it began Malware Cropper, a blog post added.

Various Linkedin and Reddit users report separately, and attackers who ask them to check the malicious environment and run in your area or correct bugs in its codes. Bitdefender warns against red flags associated with this campaign, including Vaice’s description, suspicious recommendations, and miserable communication.

The same attack reported at the beginning of this week, where players are threatened by DPRK

Crypto-stealing chain of stealing and stealing

The payload used by attackers were recognized to be info to steal the platform information addressed in Cryptocurrency Wallets. In the killing, the Shelling Collects Crypto files, and the login data used and submitted to the server, noted, already related malicious information.

After the basic elimination, steals downloads and execute the second Python text, izain99_65.py, offering Crypto related information (Pay.py) such as logs and payment logs (bow .py).

Another paid item is also enabling to fetch the infection of some malware. and to use a variety of technology, such as various Pentions, “said each investigators.


Source link