Gefälschter Passwortmanager-Codierungstest zum Hacken von Python-Entwicklern verwendet

Teilen:

Members of the North Korean hacker group Lazarus posing as recruiters are baiting Python developers with coding test project for password management products that include malware.

The attacks are part of the ‘VMConnect campaign’ first detected in August 2023, where the threat actors targeted software developers with malicious Python packages uploaded onto the PyPI repository.

According to a report from ReversingLabs, which has been tracking the campaign for over a year, Lazarus hackers host the malicious coding projects on GitHub, where victims find README files with instructions on how to complete the test.

The directions are meant to provide a sense professionalism and legitimacy to the whole process, as well as a sense of urgency.

ReversingLabs found that the North Koreans impersonate large U.S. banks like Capital One to attract job candidates, likely offering them an enticing employment package.

Further evidence retrieved from one of the victims suggests that Lazarus actively approaches their targets over LinkedIn, a documented tactic for the group.

Find the bug

The hackers direct candidates to find a bug in a password manager application, submit their fix, and share a screenshot as proof of their work.

The project files
The project files

The README file for the project instruct the victim first to execute the malicious password manager application (‘PasswordManager.py’) on their system and then start looking for the errors and fixing them.

README file with the project instructions
README file with the project instructions
Quelle: ReversingLabs

That file triggers the execution of a base64 obfuscated module hidden in the’_init_.py’ files of the ‘pyperclip’ and ‘pyrebase’ libraries.

The obfuscated string is a malware downloader that contacts a command and control (C2) server and awaits for commands. Fetching and running additional payloads is within its capabilities.

The base64 obfuscated string
The base64 obfuscated string
Quelle: ReversingLabs

To make sure that the candidates won’t check the project files for malicious or obfuscated code, the README file require the task to be completed quickly: five minutes for building the project, 15 minutes to implement the fix, and 10 minutes to send back the final result.

This is supposed to prove the developer’s expertise in working with Python projects and GitHub, but the goal is to make the victim skip any security checks that may reveal the malicious code.

Introducing a pressing time factor
Introducing a pressing time factor for candidates
Quelle: ReversingLabs

ReversingLabs has found evidence that the campaign was still active on July 31 and believe that it is ongoing.

Software developers receiving job application invites from users on LinkedIn or elsewhere should be wary about the possibility of deception and take into consideration that the profiles contacting them could be fake.

Before receiving the assignment, try to verify the other person’s identity and independently confirm with the company that a recruitment round is indeed underway.

ADVERTISING

Take the time to scan or carefully review the given code and only execute it in safe environments such as virtual machines or sandboxing applications.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:38 am, Jan. 24, 2025
Wetter-Symbol 10°C
L: 9° | H: 11°
overcast clouds
Luftfeuchtigkeit: 78 %
Druck: 996 mb
Wind: 17 mph WSW
Windböe: 31 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 97%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:49 am
Sonnenuntergang: 4:35 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
9° | 11°°C 0.8 mm 80% 16 mph 78 % 1001 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 6°°C 1 mm 100% 9 mph 94 % 1009 mb 2.83 mm/h
So. Jan. 26 9:00 pm
Wetter-Symbol
3° | 8°°C 1 mm 100% 18 mph 97 % 1008 mb 0 mm/h
Mo. Jan. 27 9:00 pm
Wetter-Symbol
4° | 6°°C 1 mm 100% 17 mph 90 % 987 mb 0 mm/h
Di. Jan. 28 9:00 pm
Wetter-Symbol
5° | 7°°C 1 mm 100% 13 mph 96 % 999 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
9° | 10°°C 0.8 mm 80% 16 mph 78 % 997 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
8° | 10°°C 0 mm 0% 13 mph 70 % 998 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
6° | 8°°C 0 mm 0% 8 mph 66 % 1000 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 6 mph 68 % 1001 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
5° | 5°°C 0 mm 0% 5 mph 85 % 1000 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
5° | 5°°C 0 mm 0% 4 mph 93 % 998 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
5° | 5°°C 0.52 mm 52% 3 mph 94 % 998 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
3° | 3°°C 1 mm 100% 9 mph 84 % 1003 mb 2.83 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€100,200.62
3.17%
Ethereum(ETH)
€3,233.70
5.76%
XRP(XRP)
€3.03
2.37%
Fesseln(USDT)
€0.95
0.06%
Solana(SOL)
€251.07
6.68%
Dogecoin(DOGE)
€0.341548
2.31%
USDC(USDC)
€0.95
0.00%
Shiba Inu(SHIB)
€0.000019
1.14%
Pepe(PEPE)
€0.000014
4.27%
Peanut das Eichhörnchen(PNUT)
€0.330956
-4.27%
Nach oben scrollen