North Korea-linked hacker group Slow Pisces has been linked to a new targeted campaign against cryptocurrency developers. The group uses LinkedIn to pose as potential employers offering coding assignments, delivering malware disguised as a coding challenge. Once the victim accepts the job offer, they are asked to run a Python project that installs a malware payload, called RN Loader, onto their system. This attack follows a multi-stage process, beginning with a benign-looking PDF document containing a job description that entices developers into downloading malicious software from GitHub.
The malware used by Slow Pisces is designed to harvest sensitive information from the victim’s system, including system metadata and credentials for services like iCloud, SSH, and cloud platforms. The malware, called RN Stealer, specifically targets macOS systems, gathering information such as installed applications and directory listings. This information allows the attackers to determine whether further access is needed and helps tailor the attack based on the victim’s environment.
The attack chain continues to evolve, with Slow Pisces using advanced techniques to conceal their actions and avoid detection. To prevent analysis, they use YAML deserialization to execute arbitrary code, bypassing typical malware detection methods. Additionally, they employ various strategies to control payload delivery, ensuring that their malicious tools are only deployed when necessary and not easily traced back to them.
Slow Pisces is part of a broader trend where North Korean hacker groups target cryptocurrency developers through deceptive job offers. Other groups such as Operation Dream Job and Alluring Pisces have also used similar methods to distribute malware and gain access to valuable cryptocurrency systems. By focusing on developers with access to critical cryptocurrency infrastructure, Slow Pisces aims to infiltrate high-value targets and steal sensitive data.
Reference: