Categories: Techno

North Korean hackers steal cryptocurrency from freelancers, including Ukrainian

< IMG SRC = "/Uploads/Blogs/78/EA/IB-FIC7SBCT_E0481C8B.jpg" Alt = "North Korean Hackers steal cryptocurrencies from freelancers, including Ukrainian"/~ 62 < p > North Korea hackers, under the guise of recruiters, targeted their attacks on Frilen's developers. About it with reference to the research of ESET writes Ukrainian IT media dev.ua, informs the Ukrainian merchant.

< P > most affected during 2024 as a result of malicious activity, called Deceptivedevelpment, freelancers from the United States, Canada and some European countries.

> < p >< strng > to which actions are the attackers 0 ~/p > < p >Hackers are in recruiters on social networks to target friders, especially those who work in cryptocurrency projects. The main purpose of attacks is to steal cryptocurrency, probably in order to increase North Korea's profit.

< p > malefactors copy or create images of recruiters and and & Rsquo; pursued with developers through platforms for job search such as Linkedin, Upwork and Freilaner.com, We Work Remotely, Moonlight and Cry. employment if they will pass the coding test.

< P > Test files are placed in private repositories on GitHub or similar platform, and when they are loaded, the malicious software of Beavertail is unfolding.

< p >Hackers often copy the goals of the projects without making any changes except for adding their malicious software and rewriting the Readme file. Usually hackers try to hide the harmful code somewhere in the project so that it does not cause suspicion or be easily noticeable, for example, in the internal code in the form of one line on a comment that displaces it outside the screen.

< P > Beavertail attaches browser databases for theft of credentials, as well as downloads the second stage of the campaign, InvisibleFerret, which acts as a backing, which allows the malefactor to install software for remote control of Anydesk for additional activity after compromise. /p > < p > attacks are exposed to Windows, Mac and Linux around the world. The target became both young and experienced developers.

< p > & laquo; we only observed conversations between attackers and victims of English, but we cannot confidently say that they will not use translation means to communicate with victims of other languages ​​& raquo; & ndash; Note the researchers of ESET.

< p > Another way they observed was that fake recruiter invited the victim to interview with an online conference platform and provided a link to the website from which the necessary software could be downloaded conferences. This website is usually a clone of the existing platform for conferences, and downloaded software contains the first stage of harmful software.

Natasha Kumar

Natasha Kumar has been a reporter on the news desk since 2018. Before that she wrote about young adolescence and family dynamics for Styles and was the legal affairs correspondent for the Metro desk. Before joining The Times Hub, Natasha Kumar worked as a staff writer at the Village Voice and a freelancer for Newsday, The Wall Street Journal, GQ and Mirabella. To get in touch, contact me through my natasha@thetimeshub.in 1-800-268-7116

Share
Published by
Natasha Kumar

Recent Posts

Kuba Wojewódzki is no longer the king of TVN. It is known who brings greater profits of the station

Kuba Wojewódzki is no longer the king of TVN. It is known who earns more…

1 hour ago

COVID-19 Vaccines: The Court of Justice of the EU RULES-Mandate prescription required and freedom of doctors

< IMG LOADING = "Lazy" SRSC = "/Sites/Default/Files/Styles/Medium/Public/2025-02/COVID%20vaccine%20engish.png ? Itok = VTFYKDJ_" Width = "1280"…

2 hours ago

Counteering Kabam: Ukrainian developers were first invited to NATO Innovation Challenge

< img src = "/uploads/blogs/08/fd/ib-fqicd1u51_79e5b82c.jpg" Alt = "Counteering Kabam: Ukrainian Developers were first invited to…

2 hours ago

VIVO X200 Ultra Smartphone May Overweight your iPhone by Quality of Shooting

< Img src = "/uploads/blogs/3a/3b/ib-fif8lrar_ea7f586c.jpg" ALT = "VIVO X200 Ultra can surpass the iPhone by…

2 hours ago

The Samsung Smartphone Update to Android 15 Operation System: Model List

< IMG SRC = "/Uploads/Blogs/8F/C9/IB-PICA9O9O0L_CBFCB8AC.jpg" Alt = "on the network with ' Samsung Smartphone Updates.…

3 hours ago

Detained Russian agents that corrected hostile rockets in three areas

< img src = "/uploads/blogs/fc/fc/f4/ib-Fqi94pi9j_f0388915.jpg" Alt = "detained Russian agents that corrected hostile missiles in…

3 hours ago