• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cross platform javascript stealer targets crypto wallets in new lazarus group

Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign

You are here: Home / General Cyber Security News / Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
February 5, 2025

The North Korea-linked Lazarus Group has been linked to an active campaign that leverages fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver malware capable of infecting Windows, macOS, and Linux operating systems.

According to cybersecurity company Bitdefender, the scam begins with a message sent on a professional social media network, enticing them with the promise of remote work, part-time flexibility, and good pay.

“Once the target expresses interest, the ‘hiring process’ unfolds, with the scammer requesting a CV or even a personal GitHub repository link,” the Romanian firm said in a report shared with The Hacker News.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

“Although seemingly innocent, these requests can serve nefarious purposes, such as harvesting personal data or lending a veneer of legitimacy to the interaction.”

Once the requested details are obtained, the attack moves to the next stage where the threat actor, under the guise of a recruiter, shares a link to a GitHub or Bitbucket repository containing a minimum viable product (MVP) version of a supposed decentralized exchange (DEX) project and instructs the victim to check it out and provide their feedback.

Present within the code is an obfuscated script that’s configured to retrieve a next-stage payload from api.npoint[.]io, a cross-platform JavaScript information stealer that’s capable of harvesting data from various cryptocurrency wallet extensions that may be installed on the victim’s browser.

The stealer also doubles up as a loader to retrieve a Python-based backdoor responsible for monitoring clipboard content changes, maintaining persistent remote access, and dropping additional malware.

At this stage, it’s worth noting that the tactics documented by Bitdefender exhibit overlaps with a known attack activity cluster dubbed Contagious Interview (aka DeceptiveDevelopment and DEV#POPPER), which is designed to drop a JavaScript stealer called BeaverTail and Python implant referred to as InvisibleFerret.

The malware deployed by means of the Python malware is a .NET binary that can download and start a TOR proxy server to communicate with a command-and-control (C2) server, exfiltrate basic system information, and deliver another payload that, in turn, can siphon sensitive data, log keystrokes, and launch a cryptocurrency miner.

“The threat actors’ infection chain is complex, containing malicious software written in multiple programming languages and using a variety of technologies, such as multi-layered Python scripts that recursively decode and execute themselves, a JavaScript stealer that first harvests browser data before pivoting to further payloads, and .NET-based stagers capable of disabling security tools, configuring a Tor proxy, and launching crypto miners,” Bitdefender said.

Cybersecurity

There is evidence to suggest these efforts are quite widespread, going by reports shared on LinkedIn and Reddit, with minor tweaks to the overall attack chain. In some cases, the candidates are asked to clone a Web3 repository and run it locally as part of an interview process, while in others they are instructed to fix intentionally introduced bugs in the code.

One of the Bitbucket repositories in question refers to a project named “miketoken_v2.” It is no longer accessible on the code hosting platform.

The disclosure comes a day after SentinelOne revealed that the Contagious Interview campaign is being used to deliver another malware codenamed FlexibleFerret.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «cybercriminals use go resty and node fetch in 13 million Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
Next Post: Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc cisco patches critical ise vulnerabilities enabling root cmdexec and privesc»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.