northkorea_DD_Images_shutterstock

North Korea’s Lazarus APT Evolves Developer-Recruitment Attacks

Share:

“Operation 99” uses job postings to lure freelance software developers into downloading malicious Git repositories. From there, malware infiltrates developer projects to steal source code, secrets, and cryptocurrency.

North Korea’s Lazarus threat group has launched a fresh wave of attacks targeting software developers, using recruitment tactics on job-hiring platforms. This time, the group is using job postings on LinkedIn to lure freelance developers in particular into downloading malicious Git repositories; these contain malware for stealing source code, cryptocurrency, and other sensitive data.

The SecurityScorecard STRIKE team on Jan. 9 discovered the ongoing attack, dubbed Operation 99, in which attackers pose as recruiters to entice the developers with project tests or code reviews, the researchers revealed in a report (PDF) published today.

“Victims are tricked into cloning malicious Git repositories that connect to a command-and-control (C2) server, initiating a series of data-stealing implants,” according to the post.

Attackers are using various payloads that work across Windows, macOS, and Linux in the campaign, using a layered malware delivery system with modular components that adapt to different targets. Downloaders such as Main99 retrieve and execute payloads that include Payload 99/73, brow99/73, and MCLIP, which perform tasks like keylogging, clipboard monitoring, file exfiltration from development environments, and browser credential theft.

Related:CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?

The malware also steals from application source code, secrets and configuration files, and cryptocurrency-related assets such as wallet keys and mnemonics, according to the researchers. The latter are used to facilitate direct financial theft, furthering Lazarus’ goals to fund the regime of North Korean leader Kim Jong Un.

“By embedding the malware into developer workflows, the attackers aim to compromise not only individual victims, but also the projects and systems they contribute to,” according to the report.

North Korea’s History of Targeting Developers

The campaign builds on previous tactics by the group to target developers with various malware, including 2021’s Operation Dream Job, in which the group sent fake job offers to specific organizational targets. When opened, they installed Trojan programs to collect information and send it back to the attackers.

Lazarus’ long history of using the technology job market to target victims also includes another campaign called DEV#POPPER, which targeted software developers worldwide for data theft by having attackers pose as recruiters for nonexistent jobs.

North Korean threat groups also have turned the tables and used their own cyber spies to infiltrate global organizations for cyber espionage. The now-infamous case of security firm KnowBe4 accidentally hiring a North Korean hacker shows how convincing these campaigns can be.  

Related:DoJ Busts Up Another Multinational DPRK IT Worker Scam

While a Department of Justice operation in May disrupted North Korea’s widespread IT freelance operation with the indictment of several people for helping state-sponsored actors establish fake freelancer identities and evade sanctions, the latest campaign demonstrates that Lazarus remains undaunted.

Amid all this, the new campaign shows an evolution in tactics, the researchers said.

“In this instance, Lazarus is demonstrating a higher level of sophistication and focus compared to previous campaigns,” says Ryan Sherstobitoff, senior vice president of threat research and intelligence at SecurityScorecard. These include using AI-generated profiles to pose as recruiters that appear highly authentic and realistic, “enabling them to effectively deceive victims,” he adds.

“By presenting complete and convincing profiles, they offer what seem to be genuine job opportunities to developers,” Sherstobitoff says. In some cases, Lazarus even compromises existing LinkedIn accounts to lend heft to their credibility, he adds.

The group also is employing more advanced techniques for obfuscation and encryption, making their malicious activities significantly more difficult to detect and analyze, Sherstobitoff says.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
3:53 am, Jun 23, 2025
weather icon 18°C
L: 17° | H: 18°
broken clouds
Humidity: 78 %
Pressure: 1010 mb
Wind: 15 mph WSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 75%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
17° | 18°°C 0.2 mm 20% 14 mph 78 % 1016 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
13° | 22°°C 0.2 mm 20% 13 mph 80 % 1016 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 27°°C 0 mm 0% 9 mph 86 % 1014 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
18° | 26°°C 0.48 mm 48% 14 mph 84 % 1016 mb 0 mm/h
Fri Jun 27 10:00 pm
weather icon
17° | 28°°C 0 mm 0% 16 mph 72 % 1019 mb 0 mm/h
Today 4:00 am
weather icon
17° | 18°°C 0.2 mm 20% 13 mph 78 % 1010 mb 0 mm/h
Today 7:00 am
weather icon
16° | 17°°C 0.2 mm 20% 13 mph 76 % 1011 mb 0 mm/h
Today 10:00 am
weather icon
18° | 19°°C 0 mm 0% 12 mph 54 % 1013 mb 0 mm/h
Today 1:00 pm
weather icon
22° | 22°°C 0 mm 0% 12 mph 34 % 1014 mb 0 mm/h
Today 4:00 pm
weather icon
21° | 21°°C 0 mm 0% 14 mph 32 % 1014 mb 0 mm/h
Today 7:00 pm
weather icon
22° | 22°°C 0 mm 0% 13 mph 39 % 1014 mb 0 mm/h
Today 10:00 pm
weather icon
17° | 17°°C 0 mm 0% 10 mph 53 % 1016 mb 0 mm/h
Tomorrow 1:00 am
weather icon
14° | 14°°C 0 mm 0% 8 mph 69 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€88,117.82
-1.07%
Ethereum(ETH)
€1,948.86
-1.01%
Tether(USDT)
€0.87
0.00%
XRP(XRP)
€1.76
-1.78%
Solana(SOL)
€115.59
-1.04%
USDC(USDC)
€0.87
0.00%
Dogecoin(DOGE)
€0.132752
-0.96%
Shiba Inu(SHIB)
€0.000010
-1.41%
Pepe(PEPE)
€0.000008
-3.83%
Peanut the Squirrel(PNUT)
€0.218896
13.10%
Scroll to Top