Bitdefender Labs has issued a warning on an active campaign by the North Korea-linked Lazarus Group, targeting organisations by capturing credentials and delivering malware through fake LinkedIn job offers.
LinkedIn may be a vital tool for job seekers and professionals, but it has also become a playground for cybercriminals exploiting its credibility. From fake job offers and elaborate phishing schemes to scams and even state-sponsored threat actors who prey on peopleโs career aspirations and trust in professional networks.
To shed light on such scenarios, this article delves into the deceptive tactics of a failed โrecruitmentโ operation on LinkedIn, where the attackers made one critical mistake: they targeted a Bitdefender researcher who quickly uncovered their malicious intent.
The Setup: A Tempting Job Offer
The scam begins with an enticing message: an opportunity to collaborate on a decentralised cryptocurrency exchange. While the details are left deliberately vague, the promise of remote work, part-time flexibility, and reasonable pay can lure unsuspecting individuals. Variations of this scam have also been observed, with projects supposedly related to travel or financial domains.
Once the target expresses interest, the โhiring processโ unfolds, with the scammer requesting a CV or even a personal GitHub repository link. Although seemingly innocent, these requests can serve nefarious purposes, such as harvesting personal data or lending a veneer of legitimacy to the interaction.
The submitted files provided by the applicant are most definitely put to good use by the โrecruiterโ who can harvest information and use it to further legitimise the conversation with the unsuspecting victim.
The Trap: Running the Malicious Code
After receiving the requested information, the criminal shares a repository containing the โminimum viable productโ (MVP) of the project. He also includes a document with questions that can only be answered by executing the demo.
At first glance, the code appears harmless. However, closer inspection reveals a heavily obfuscated script that dynamically loads malicious code from a third-party endpoint.
Our researchers noted that the payload is a cross-platform info-stealer that can be deployed on Windows, MacOS and Linux operating systems. This infostealer is engineered to target a range of popular cryptocurrency wallets by looking up for the crypto-related browsing extensions with a range of IDs.
Once deployed, the stealer collects important files corresponding to these extensions while also collecting login data of the used browsers and exfiltrates the information to a malicious IP address that seems to contain other malicious files on the server. After exfiltrating login and extension-related data, the JavaScript stealer downloads and executes a Python script named main99_65.py that sets the stage for other malicious activities.
The Python script decompresses and decodes itself recursively until it finally reveals the next stage โ a hidden script that further enables the download of three additional Python modules:
mlip.py
- Hooks keyboard events specifically targeting web browsers.
- Monitors clipboard changes system-wide for crypto-related data.
- Immediately sends stolen data to a remote attacker-controlled server.
pay.py
- Reports system/network info to the attacker.
- Searches for and exfiltrates valuable files (documents, environment variables, private keys, crypto mnemonics) and uploads these files to the attackerโs C2 server.
- Maintains a persistent communication channel for additional commands and scripts.
bow.py
- Iterates over the following browsers: Chrome, Brave, Opera, Yandex, Microsoft Edge
- Extracts and exfiltrates sensitive browser data (logins and payment info) for Windows, Linux, and macOS
- Runs the Tsunami Injector python script that connects to multiple Pastebins to reach the URL for the payload (.exe 617205f5a241c2712d4d0a3b06ce3afd)
The next payload in line (a .NET binary) proceeds to further drop dependencies alongside the main payload. One of the dependencies adds malicious binaries to the exception list of Microsoft Defender, while also downloading and starting a Tor Proxy Server to communicate with the Command & Control (C2) server. Furthermore, the binary also downloads another malicious executable from the Tor C2, installs .NET 6.0 if it is not already installed, and exfiltrates the following fingerprinting information about the victim:
- Name of the host
- Username
- Operating system
- Processor name and core count
- GPU name
- RAM information
- Public IP & Country & City
The executable downloaded from the Tor C2 server contains multiple modules that are run on different threads:
- Backdoor โ performs a wide range of data-collection operations (browser passwords, sessions, crypto wallet keys, discord account secrets);
- โSecret fileโ stealer โ a configurable stealer that scans and exfiltrates files based on designated rules fetched from the C2 server;
- Crypto-miner โ also configurable. It can be throttled based on certain monitored metrics (CPU & GPU load, CPU cores, RAM amount, ongoing activity);
- Keylogger โ uses the win32 APIs to capture, store and exfiltrate keystrokes.
The threat actorsโ infection chain is complex, containing malicious software written in multiple programming languages and using a variety of technologies, such as multi-layered Python scripts that recursively decode and execute themselves, a JavaScript stealer that first harvests browser data before pivoting to further payloads, and.NET-based stagers capable of disabling security tools, configuring a Tor proxy, and launching crypto miners.
The malware infects Windows, macOS, and Linux via cross-platform compatibility, uses a variety of exfiltration methods (HTTP, Tor, and attacker-controlled IPs), and includes modules for keylogging, system reconnaissance, file harvesting, and continuous C2 communication, demonstrating the breadth and complexity of its capabilities.
The Mastermind: A State-Sponsored Threat Actor
Analysis of the malware and operational tactics strongly suggests the involvement of state-sponsored threat actors, specifically those from North Korea. These actors, previously linked to malicious job offers and fake job applications, have ties to groups like the Lazarus Group (APT 38).
Their objectives go beyond personal data theft. By compromising people working in sectors such as aviation, defense, and nuclear industries, they aim to exfiltrate classified information, proprietary technologies, and corporate credentials. In this case, executing the malware on enterprise devices could grant attackers access to sensitive company data, amplifying the damage.
While in this article, weโve discussed malicious job offers, it has been observed that the same threat actors have tried to infiltrate various companies by faking identities and applying for a multitude of job positions. The result would be approximately the same: private information, credentials, and technology would be exfiltrated by corporate spies.
How to Stay Safe
As social platforms increasingly become hotspots for malicious activities, vigilance is essential. Here are some red flags and measures to protect yourself:
Red Flags
- Vague job descriptions: No corresponding job posting on the platform.
- Suspicious repositories: Belong to users with random names and lack proper documentation or contributions.
- Poor communication: Frequent spelling errors and refusal to provide alternative contact methods, such as corporate emails or phone numbers.
Best Practices
- Avoid running unverified code: Use virtual machines, sandboxes, or online platforms to test code safely.
- Verify authenticity: Cross-check job offers with official corporate websites and confirm email domains.
- Adopt a cautious mindset: Scrutinise unsolicited messages and requests for personal information.
It is ideal to never execute any foreign source code on enterprise devices, and to use virtual machines, sandboxes or various online platforms when doing so on personal computers. Even though this would add some overhead to the process, it would prevent any personal information from being leaked and used with malicious intent in the future.