CyberSecurity updates
2025-01-17 16:36:15 Pacfic

North Korea Lazarus targets software developers. - 1d
Read more: ciso2ciso.com

North Korea's Lazarus APT group is actively targeting software developers, especially those in Web3 and cryptocurrency, through fake job postings on platforms like LinkedIn. These fake recruitment emails and job postings, often utilizing realistic AI-generated profiles, lure developers into downloading malicious Git repositories. These repositories contain malware that allows the attackers to steal source code, cryptocurrency, and sensitive data. Once compromised, the developers' systems can be used in supply chain attacks, potentially affecting wider projects and enterprises. The campaign, known as Operation 99, uses layered malware delivered through downloaders like Main99, which executes payloads like Payload 99/73, brow99/73, and MCLIP, enabling keylogging, clipboard monitoring, and data exfiltration from development environments.

This operation is part of a broader strategy by the Lazarus Group to generate income for North Korea's regime by targeting cryptocurrency assets and software development ecosystems. The stolen funds are used to finance Kim Jong Un's nuclear ambitions while circumventing international sanctions. This tactic has been deployed globally, with known targets in Argentina, Brazil, Egypt, and other countries. The Lazarus Group also utilizes North Korean IT workers posing as job candidates, adding another vector for infiltrating target companies and further demonstrates the evolving sophistication of state-sponsored cyber threat actors. This also highlights the importance of heightened cyber security awareness within both the public and private sector.