{"id":24808,"date":"2025-06-20T13:26:27","date_gmt":"2025-06-20T10:26:27","guid":{"rendered":"https:\/\/forklog.com\/en\/north-korean-hackers-target-crypto-job-seekers-with-fake-interviews\/"},"modified":"2025-06-20T13:26:27","modified_gmt":"2025-06-20T10:26:27","slug":"north-korean-hackers-target-crypto-job-seekers-with-fake-interviews","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/north-korean-hackers-target-crypto-job-seekers-with-fake-interviews\/","title":{"rendered":"North Korean Hackers Target Crypto Job Seekers with Fake Interviews"},"content":{"rendered":"<p>The North Korean hacker group Famous Chollima has developed a new trojan, PylangGhost. The perpetrators distribute it through fake interviews targeting professionals in the crypto industry, according to researchers from <a href=\"https:\/\/blog.talosintelligence.com\/python-version-of-golangghost-rat\/\">Cisco Talos<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">How the Scheme Operates<\/h2>\n<p>The hackers create fraudulent websites that mimic well-known companies like Coinbase, Robinhood, and Uniswap.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"451\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Snimok-ekrana-2025-06-20-124447-1024x451.png\" alt=\"Snimok-ekrana-2025-06-20-124447\" class=\"wp-image-260752\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/Snimok-ekrana-2025-06-20-124447-1024x451.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/Snimok-ekrana-2025-06-20-124447-300x132.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/Snimok-ekrana-2025-06-20-124447-768x338.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/Snimok-ekrana-2025-06-20-124447.png 1096w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Example of a fake job search website. Data: Cisco Talos.<\/figcaption><\/figure>\n<p>Recruiters direct applicants to these sites for testing. Candidates are then asked to turn on their cameras for a video interview. This requires executing a console command that supposedly installs a video driver. In reality, this command downloads malware.<\/p>\n<h2 class=\"wp-block-heading\">Capabilities of the Trojan<\/h2>\n<p>PylangGhost is a remote access trojan (RAT) written in Python and designed for Windows systems. It is analogous to the previously known GolangGhost virus for macOS. Linux-based systems are not affected in these campaigns.\u00a0<\/p>\n<p>Once activated, the virus provides remote control over the infected system. It steals cookies and credentials from over 80 browser extensions. Targets include password managers like 1Password and NordPass, as well as crypto wallets such as MetaMask, Phantom, Bitski, and TronLink.<\/p>\n<p>The virus ensures hackers maintain persistent remote access to the infected system.<\/p>\n<p>Researchers noted that the hackers likely did not use large language models to write the virus code.<\/p>\n<h2 class=\"wp-block-heading\">India as the Primary Target<\/h2>\n<p>The perpetrators mainly target professionals from India. Experts highlighted this as part of a broader North Korean strategy. The group not only steals funds from exchanges but also attempts to infiltrate crypto companies to gather intelligence.<\/p>\n<p>Dilip Kumar, Director of Digital South Trust, told <a href=\"https:\/\/decrypt.co\/326187\/new-malware-crypto-job-scams-north-korea\">Decrypt<\/a> that to combat such incidents, &#8220;India must implement mandatory cybersecurity audits for blockchain companies and monitor fake job portals.&#8221;<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;<span data-descr=\"national structure for responding to information security incidents in India\" class=\"old_tooltip\">CERT-In<\/span> should issue red alerts, and <span data-descr=\"Ministry of Electronics and Information Technology of the Government of India\" class=\"old_tooltip\">MEITY<\/span> and <span data-descr=\"National Critical Information Infrastructure Protection Centre of India\" class=\"old_tooltip\">NCIIPC<\/span> should enhance global coordination in combating cross-border cybercrime,&#8221; he said.<\/p>\n<\/blockquote>\n<p>Kumar also called for &#8220;strengthening legal provisions&#8221; under the Information Technology Act and &#8220;campaigns to raise digital awareness.&#8221;<\/p>\n<p>Back in April, experts from Silent Push <a href=\"https:\/\/forklog.com\/en\/news\/north-korean-hackers-establish-fake-firms-to-deceive-users\">reported<\/a> that the group Contagious Interview, linked to Lazarus, registered three shell companies to distribute malware. These firms are used to deceive users through fake interviews.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The North Korean hacker group Famous Chollima has developed a new trojan, PylangGhost. The perpetrators distribute it through fake interviews targeting professionals in the crypto industry, according to researchers from Cisco Talos. How the Scheme Operates The hackers create fraudulent websites that mimic well-known companies like Coinbase, Robinhood, and Uniswap. Example of a fake job [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[44,278,1202],"class_list":["post-24808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybercrime","tag-india","tag-north-korea-dprk"],"aioseo_notices":[],"amp_enabled":true,"views":"35","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/24808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=24808"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/24808\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/24807"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=24808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=24808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=24808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}