Skip to content

Cybercriminals Lazarus Group Modify Strategies, Infecting Job Seekers in CeFi Sector with 'ClickFix' Malware

Latest Threats Emanating From Infamous Hacking Collective

Cybercriminals Lazarus Group Modify Strategies, Infecting Job Seekers in CeFi Sector with 'ClickFix' Malware

Unmasking the Lazarus Group's Latest Scheme: 'ClickFix'

digging deeper into the nefarious activities of the Lazarus Group, notorious for its ties to North Korea. This cybercrime syndicate has adapted its tactics, now using an innovation called "ClickFix." They've targeted job seekers in the cryptocurrency sector, particularly within the realm of centralized finance (CeFi).

This evolution marks a shift from their earlier "Contagious Interview" campaign that primarily focused on developers and engineers in artificial intelligence and crypto-related positions.

Lazarus Takes Aim at Cryptocurrency Job Seekers

In this new phase, the Lazarus Group has set its sights on non-technical professionals such as marketing and business development personnel. By impersonating popular cryptocurrency giants like Coinbase, KuCoin, Kraken, and Tether, they create fraudulent employment websites resembling genuine application portals.

To lure candidates, these deceptive sites offer fake job interview invitations. Often, they include realistic application forms, requests for video introductions, and even incorporate elements that mimic real job application processes, enhancing their legitimacy.

However, when a user attempts to record a video, they are shown a convincing error message—usually claiming a webcam or driver issue. The page then prompts the user to run PowerShell commands, pretending to help resolve the supposed technical issue, but actually triggering the malware download.

Due to its psychological simplicity, the 'ClickFix' method is gaining traction as victims believe they're resolving a technical problem, not knowingly installing malicious software. According to Sekoia, the campaign utilizes materials from 184 fake interview invitations and references at least 14 prominent companies to boost credibility.

This latest strategy highlights Lazarus' increasing proficiency in social engineering and their ability to exploit aspiring professionals in the cutthroat cryptocurrency job market. Interestingly, the broader scope suggests that the group is no longer just targeting individuals with access to code or infrastructure; they're also focusing on those who might manage sensitive internal data or inadvertently facilitate breaches.

Although ClickFix has taken center stage, Sekoia revealed that the original Contagious Interview campaign remains active. This coupled deployment suggests that North Korea's state-sponsored collective may be testing their strategies' effectiveness or tailoring tactics to different demographics. Either way, both campaigns aim for one consistent goal—delivering info-stealing malware through trusted channels and manipulating victims into self-infecting.

Lazarus Linked to Bybit Hack

In a staggering move, the Federal Bureau of Investigation (FBI) officially attributed the $1.5 billion attack on Bybit to the Lazarus Group. Cybercriminals targeting the crypto exchange employed fake job offers to trick employees into installing tainted trading software called "TraderTraitor."

Despite appearing authentic through cross-platform JavaScript and Node.js development, these applications hid malware designed to steal private keys and execute illicit transactions on the blockchain.

Don't Miss This Exclusive Binance Offer! Register here and receive $600 welcome bonus on Binance—exclusively for our readers! Looking to join Bybit? Click here to get started and open a $500-free position on any coin!📈💸Hacks and Lazarus Group | Facebook | Twitter | LinkedIn | Telegram

The 'ClickFake Interview' campaign breaks down as follows:

  1. Deceptive Job Postings: Lazarus creates fake job postings on platforms like LinkedIn, targeting professionals across the cryptocurrency sector.
  2. Social Engineering: In character as recruiters, they reach out to potential victims and engage in comprehensive interview conversations to establish credibility.
  3. Malicious Links/Documents: During these fake interviews, victims are coaxed into opening malicious documents or clicking on compromised links, leading to malware infections.
  4. Malware Deployment: The ClickFix malware gives Lazarus remote access to the victim’s system, enabling them to steal sensitive data, such as cryptocurrency wallet credentials.

To shield yourself from 'ClickFix' tactics, consider these preventative measures:

  • Verify Sources: To ensure the authenticity of job postings and recruiters, confirm sources by checking official company websites or directly contacting human resources departments.
  • Be Skeptical about Links/Documents: Be cautious when clicking on links or opening attachments from unknown senders.
  • Keep Security Software Updated: Keep your antivirus software up-to-date and run regular scans.

For organizations:

  • Employee Education: Educate employees about social engineering tactics and help them identify suspicious communications.
  • Implement Security Measures: Safeguard communications by using secure channels and validating all external interactions.
  • Deploy Advanced Security Tools: Equip your system with tools that detect and block malicious links and attachments.

In the world of cybercrime, it pays to stay informed. Familiarize yourself with the latest threats and protect your valuable data. Stay vigilant!

  1. The Lazarus Group, notorious for its ties to North Korea, has evolved its tactics with an innovation called "ClickFix," targeting non-technical professionals such as marketing and business development personnel in the cryptocurrency sector.
  2. In its new phase, the Lazarus Group mimics popular cryptocurrency giants like Coinbase, KuCoin, Kraken, and Tether, creating fraudulent employment websites resembling genuine application portals.
  3. The malicious 'ClickFix' method lures candidates through fake job interview invitations; these sites include realistic application forms, requests for video introductions, and elements that mimic real job application processes.
  4. When a user attempts to record a video, they are shown a convincing error message, prompting them to run PowerShell commands, which ultimately trigger the malware download.
  5. As cryptocurrency finance continues to expand, Lazarus is no longer just focusing on individuals with access to code or infrastructure; they are also targeting those managing sensitive internal data or those who might inadvertently facilitate breaches.
  6. Simultaneously, the original Contagious Interview campaign remains active, and the dual deployment suggests that Lazarus is testing the effectiveness of their strategies or tailoring tactics to different demographics. Hacks, Lazarus Group, and cybersecurity continue to be pressing concerns in the world of finance and technology.
Hacking group's fresh round of dangerous cyber threats unveiled
New warnings issued by infamous hacking collective regarding their upcoming cyberattacks

Read also:

    Latest