Article Details
Scrape Timestamp (UTC): 2024-04-26 14:25:38.370
Original Article Text
Click to Toggle View
Fake job interviews target developers with new Python backdoor. A new campaign tracked as “Dev Popper” is targeting software developers with fake job interviews in an attempt to trick them into installing a Python remote access trojan (RAT). The developers are asked to perform tasks supposedly related to the interview, like downloading and running code from GitHub, in an effort to make the entire process appear legitimate. However, the threat actor's goal is make their targets download malicious software that gathers system information and enables remote access to the host. According to Securonix analysts, the campaign is likely orchestrated by North Korean threat actors based on the observed tactics. The connections are not strong enough for attribution, though. Multi-stage infection chain “Dev Popper” attacks involve a multi-stage infection chain based on social engineering, designed to deceive targets through a process of progressive compromise. The attackers initiate contact by posing as employers that offer looking to fill software developer positions. During the interview, the candidates are asked to download and run what is presented as a standard coding task from a GitHub repository. The file is a ZIP archive containing an NPM package, which has a README.md as well as frontend and backend directories. Once the developer runs the NPM package, an obfuscated JavaScript file (“imageDetails.js”) hidden inside the backend directory is activated, executing ‘curl’ commands through the Node.js process to download an additional archive (“p.zi”) from an external server. Inside the archive is the next stage payload, an obfuscated Python script (“npl”) that functions as a RAT. Once the RAT is active on the victim’s system, it collects and sends basic system information to the command and control (C2) server, including OS type, hostname, and network data. Securonix reports that the RAT supports the following capabilities: Although the perpetrators of the Dev Popper attack aren’t known, the tactic of using job lures as bait to infect people with malware is still prevalent, so people should remain vigilant of the risks. The researchers note that the method "exploits the developer’s professional engagement and trust in the job application process, where refusal to perform the interviewer’s actions could compromise the job opportunity," which makes it very effective. North Korean hackers have been using the "fake job offer" tactic for multiple operations over the years to compromise their targets over various platforms. There have been numerous reports [1, 2, 3, 4, 5] last year about North Korean hacking groups using fake job opportunities to connect to and compromise security researchers, media organizations, software developers (especially for DeFi platforms), or employees of aerospace companies. In a spear-phishing attack, the threat actor impersonated journalists to collect intelligence from think tanks, research hubs, and academic organizations.
Daily Brief Summary
A new cybercrimes campaign, coined “Dev Popper,” targets software developers through deceptive job interview offers to install a Python-based remote access trojan (RAT).
Attackers contact potential developer candidates posing as employers, presenting coding tasks from a GitHub repository as part of the interview process.
The malicious file downloaded by the candidates is a ZIP archive that includes an NPM package, which upon execution activates a hidden obfuscated JavaScript file designed to download further malware.
The multi-stage infection ultimately installs a RAT that relays vital system information (OS type, hostname, network data) to the attacker's command and control server.
While the exact perpetrators are uncertain, the tactics suggest a possible link to North Korean threat actors, although there is not enough evidence for definitive attribution.
Securonix, the security firm analyzing the campaign, emphasizes the efficacy of this method due to its exploitation of professional trust and engagement in the job application process.
This method is part of a broader pattern of North Korean hackers using job lures to target various sectors, including security researchers and aerospace employees.