< IMG SRC = "/Uploads/Blogs/78/EA/IB-FIC7SBCT_E0481C8B.jpg" Alt = "North Korean Hackers steal cryptocurrencies from freelancers, including Ukrainian"/~ 62 < p > North Korea hackers, under the guise of recruiters, targeted their attacks on Frilen's developers. About it with reference to the research of ESET writes Ukrainian IT media dev.ua, informs the Ukrainian merchant.
< P > most affected during 2024 as a result of malicious activity, called Deceptivedevelpment, freelancers from the United States, Canada and some European countries.
> < p >< strng > to which actions are the attackers 0 ~/p > < p >Hackers are in recruiters on social networks to target friders, especially those who work in cryptocurrency projects. The main purpose of attacks is to steal cryptocurrency, probably in order to increase North Korea's profit.
< p > malefactors copy or create images of recruiters and and & Rsquo; pursued with developers through platforms for job search such as Linkedin, Upwork and Freilaner.com, We Work Remotely, Moonlight and Cry. employment if they will pass the coding test.
< P > Test files are placed in private repositories on GitHub or similar platform, and when they are loaded, the malicious software of Beavertail is unfolding.
< p >Hackers often copy the goals of the projects without making any changes except for adding their malicious software and rewriting the Readme file. Usually hackers try to hide the harmful code somewhere in the project so that it does not cause suspicion or be easily noticeable, for example, in the internal code in the form of one line on a comment that displaces it outside the screen.
< P > Beavertail attaches browser databases for theft of credentials, as well as downloads the second stage of the campaign, InvisibleFerret, which acts as a backing, which allows the malefactor to install software for remote control of Anydesk for additional activity after compromise. /p > < p > attacks are exposed to Windows, Mac and Linux around the world. The target became both young and experienced developers.
< p > & laquo; we only observed conversations between attackers and victims of English, but we cannot confidently say that they will not use translation means to communicate with victims of other languages & raquo; & ndash; Note the researchers of ESET.
< p > Another way they observed was that fake recruiter invited the victim to interview with an online conference platform and provided a link to the website from which the necessary software could be downloaded conferences. This website is usually a clone of the existing platform for conferences, and downloaded software contains the first stage of harmful software.
Kuba Wojewódzki is no longer the king of TVN. It is known who earns more…
< IMG LOADING = "Lazy" SRSC = "/Sites/Default/Files/Styles/Medium/Public/2025-02/COVID%20vaccine%20engish.png ? Itok = VTFYKDJ_" Width = "1280"…
< img src = "/uploads/blogs/08/fd/ib-fqicd1u51_79e5b82c.jpg" Alt = "Counteering Kabam: Ukrainian Developers were first invited to…
< Img src = "/uploads/blogs/3a/3b/ib-fif8lrar_ea7f586c.jpg" ALT = "VIVO X200 Ultra can surpass the iPhone by…
< IMG SRC = "/Uploads/Blogs/8F/C9/IB-PICA9O9O0L_CBFCB8AC.jpg" Alt = "on the network with ' Samsung Smartphone Updates.…
< img src = "/uploads/blogs/fc/fc/f4/ib-Fqi94pi9j_f0388915.jpg" Alt = "detained Russian agents that corrected hostile missiles in…