North Korean hackers have recently intensified their cyber operations with a new campaign dubbed “Contagious Interview.” Discovered by Group-IB in August 2024, this campaign targets job seekers by deploying a fake video conferencing application masquerading as FreeConference.com. The malicious software, which is a part of the DEV#POPPER attack chain attributed to the Lazarus Group, is distributed through fraudulent job interviews. Victims are deceived into downloading a Node.js project that contains the BeaverTail downloader malware, which subsequently installs the InvisibleFerret backdoor. This sophisticated malware provides attackers with remote control capabilities, keylogging, and the ability to steal browser data.
The attack has evolved from earlier methods, which involved distributing JavaScript malware via npm packages. The latest approach utilizes fake installers for both Windows and macOS, disguised as legitimate software like MiroTalk or FreeConference.com. The malicious installer, hosted on the domain freeconference[.]io, represents a shift in tactics as attackers now use these installers to deploy the BeaverTail malware. This update signifies an advanced strategy to bypass conventional security measures and increase the success rate of their infiltration efforts.
Group-IB’s findings also reveal that the attackers are now injecting malicious JavaScript into cryptocurrency and gaming-related repositories. This code retrieves the BeaverTail JavaScript from domains such as ipcheck[.]cloud and regioncheck[.]net, reflecting the campaign’s adaptation to new distribution vectors. Additionally, BeaverTail has been upgraded to target more cryptocurrency wallet extensions and maintain persistence through AnyDesk. The malware’s data-stealing capabilities have been further enhanced with the introduction of CivetQ, a set of Python scripts designed to extract sensitive information from various sources, including Microsoft Sticky Notes and browser extensions.
The FBI has recently issued warnings about North Korean cyber actors’ aggressive targeting of the cryptocurrency sector using sophisticated social engineering tactics. This campaign highlights the increasing complexity and creativity of North Korean hacking operations, as they continue to refine their tools and techniques. As the Lazarus Group expands their reach and targets, it is crucial for job seekers and organizations to remain vigilant and implement robust security measures to protect against these evolving threats.
Reference: