{"id":350,"date":"2025-03-25T21:57:59","date_gmt":"2025-03-25T21:57:59","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=350"},"modified":"2025-03-25T21:57:59","modified_gmt":"2025-03-25T21:57:59","slug":"faux-job-gives-goal-coders-with-infostealers","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=350","title":{"rendered":"Faux job gives goal coders with infostealers"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">A North Korea-aligned exercise cluster tracked by ESET as DeceptiveDevelopment drains victims&#8217; crypto wallets and steals their login particulars from internet browsers and password managers<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/editor\/\" title=\"Editor\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2013\/12\/pen-tip-200.png\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2013\/12\/pen-tip-200.png\" alt=\"Editor\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>20 Feb 2025<\/span>\n    <\/p>\n<\/div>\n<div>\n<p>ESET researchers have noticed a malicious marketing campaign the place North Korea-aligned risk actors, posing as headhunters, goal freelance software program builders with info-stealing malware.<\/p>\n<p>The actions \u2013 named <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/deceptivedevelopment-targets-freelance-developers\/\" target=\"_blank\" rel=\"noopener\">DeceptiveDevelopment<\/a> and going again to not less than November 2023 \u2013 contain spearphishing messages which can be being distributed on job-hunting and freelancing websites and ask the targets to take a coding check, with the information vital for the duty normally hosted on personal repositories resembling GitHub. These information are laden with malware, nevertheless, which finally lets the attackers steal the victims&#8217; login particulars and drain their cryptocurrency wallets.<\/p>\n<p>What else is there to know in regards to the marketing campaign&#8217;s techniques, strategies, and procedures? Be taught from ESET Chief Safety Evangelist <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/tony-anscombe\/\" target=\"_blank\" rel=\"noopener\">Tony Anscombe<\/a> within the video and ensure to learn the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/bootkitty-analyzing-first-uefi-bootkit-linux\/\" target=\"_blank\" rel=\"noopener\">full blogpost<\/a>.<\/p>\n<p><iframe class=\"embed-video\" title=\"\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/4HbCyW1ljRE\"><\/iframe><\/p>\n<blockquote>\n<p>Join with us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/eset\">Fb<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/ESET\" target=\"_blank\" rel=\"noopener\">X<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/eset\/\">LinkedIn<\/a>\u00a0and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.instagram.com\/eset\/\">Instagram<\/a>.<\/p>\n<\/blockquote>\n<\/div>\n<p><template id="UZI2x1uzdb9iD8QGQT9r"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A North Korea-aligned exercise cluster tracked by ESET as DeceptiveDevelopment drains victims&#8217; crypto wallets and steals their login particulars from internet browsers and password managers 20 Feb 2025 ESET researchers have noticed a malicious marketing campaign the place North Korea-aligned risk actors, posing as headhunters, goal freelance software program builders with info-stealing malware. The actions [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":352,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[71,67,72,68,69,70],"class_list":["post-350","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-coders","tag-fake","tag-infostealers","tag-job","tag-offers","tag-target"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=350"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/350\/revisions\/351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/352"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 12:32:15 UTC -->