North Korean Hackers Strike Again – Fake U.S. Companies Used to Lure Crypto Devs 🇺🇸

In the ever-evolving world of cybercrime, Lazarus Group, the infamous North Korean hacking syndicate, has once again surfaced, this time using a new and creative tactic to target unsuspecting victims in the crypto space. Known for orchestrating some of the largest cyber heists in history, Lazarus continues to pose a significant threat to the crypto ecosystem.

🔎 The Latest Tactic: Fake U.S. Companies Offering Job Interviews

According to a Silent Push cybersecurity report, Lazarus Group’s subgroup “Contagious Interview” has created several fake companies to lure crypto developers into what seems like legitimate job opportunities. These companies, including BlockNovas (New Mexico) and SoftGlide (New York), have been set up with highly convincing profiles, using AI-generated employee names to create a sense of legitimacy.

The goal? To lure developers into fake job interviews, where malware is delivered through the job application process. Once the victim falls for the scam, malware is installed, allowing hackers to access sensitive wallet credentials and potentially infiltrate real companies.


🎯 The Target: Crypto Developers

Crypto developers are prime targets for hackers due to their access to critical infrastructure, code, and digital wallets. In recent years, the frequency and sophistication of these attacks on the developer community have skyrocketed. By pretending to be U.S.-based companies offering high-paying roles, Lazarus is preying on the desire for developers to join well-established firms or projects in the crypto and blockchain industry.


🎣 How the Scam Works: Fake Job Offers + Malware

  1. Fake Job Offers: Lazarus Group’s subgroup Contagious Interview sets up fake job listings at seemingly legitimate companies. These companies offer high-paying roles to attract the best and brightest developers in the space.
  2. AI-Generated Employee Profiles: To add authenticity, AI-generated profiles for employees at these fake companies are created, making it look like a well-established organization with real people behind it.
  3. Fake Interviews: Once the developer expresses interest, they are invited to a fake job interview, often conducted via encrypted messaging platforms like Telegram or Signal. During these interviews, the hacker gains trust and subtly convinces the developer to download malware-laden software or engage in risky actions.
  4. Malware Deployment: After the victim installs the malware, it’s game over. Hackers gain access to the developer’s crypto wallet credentials, internal project files, and potentially sensitive company data. This paves the way for larger attacks or even the hijacking of entire crypto projects.

🎭 Tools of the Trade: AI and Malware

The use of AI-generated profiles is a particularly concerning development, as it allows hackers to create realistic personas that seem completely authentic. Coupled with social engineering tactics, such as creating a false sense of urgency or promising big rewards, these tactics make it more difficult for developers to spot the scam.

Additionally, the malware delivered in these attacks often targets wallet credentials, enabling hackers to siphon off funds or access internal company assets. This mirrors the methods used in previous attacks by Lazarus Group, such as the Axie Infinity hack ($625M) and the Harmony hack ($100M).


💰 The Bigger Picture: Over $3B in Crypto Looted Since 2017

Lazarus Group has been wreaking havoc in the crypto space for years, having looted over $3 billion in cryptocurrency since its first major attack. The group has been behind some of the largest and most devastating hacks in history, targeting everything from crypto exchanges to DeFi projects.

Their tactics continue to evolve, making it harder for even the most experienced developers and companies to spot the signs of an attack before it’s too late. This latest attack using fake job offers is just one example of how creative they’ve become in their pursuit of crypto assets.


🛡️ How to Protect Yourself: Stay Vigilant

  1. Verify Job Offers: Always be cautious when receiving unsolicited job offers, especially those that seem too good to be true. If the offer comes from an unfamiliar company, take the time to research and verify its legitimacy.
  2. Be Skeptical of AI-Generated Profiles: With AI tools becoming more advanced, it’s increasingly difficult to distinguish real people from fake profiles. Always double-check the details of any employees you interact with, and cross-reference their information with official company websites.
  3. Avoid Downloading Unverified Software: If a potential employer asks you to download software or engage in any actions that could compromise your device, think twice. Always ask for a second opinion or consult with a cybersecurity expert.
  4. Use a Hardware Wallet: For added protection, use a hardware wallet to store your cryptocurrency. Hardware wallets are less susceptible to online attacks and malware than software wallets.

👀 Final Thoughts: Lazarus Group’s Continued Threat

The Lazarus Group’s latest attack using fake U.S. companies highlights how sophisticated cybercriminals have become. By exploiting the developer community with fake job offers, they’re not only stealing funds but also compromising entire crypto projects. The group’s continued presence in the space underscores the importance of cybersecurity in crypto and blockchain.

As the cryptocurrency space continues to grow, so will the threats from hackers like Lazarus. Developers and investors must remain vigilant, ensuring they don’t fall for phishing scams or other malicious tactics.

Stay informed, stay safe, and always verify before you trust.

Share this Blog →