financetom
Technology
financetom
/
Technology
/
ESET Research’s deep dive into DeceptiveDevelopment, North Korean crypto theft via fake job offers
News World Market Environment Technology Personal Finance Politics Retail Business Economy Cryptocurrency Forex Stocks Market Commodities
ESET Research’s deep dive into DeceptiveDevelopment, North Korean crypto theft via fake job offers
Sep 25, 2025 2:23 AM

ESET Research released a deep dive report into the activities of the DeceptiveDevelopment threat group and North Korean IT workers, which are considered tightly bound.The analyzed campaigns rely heavily on sophisticated social engineering tactics, including fake job interviews and the ClickFix technique, to deliver malware and exfiltrate cryptocurrency with a possible secondary objective of cyberespionage.ESET also analyzed OSINT data that sheds light on the operations of North Korean IT workers involved in fraudulent employment schemes.

PRAGUE and BRATISLAVA, Slovakia, Sept. 25, 2025 (GLOBE NEWSWIRE) -- ESET Research has released new findings on DeceptiveDevelopment, also known as Contagious Interview – a threat group aligned with North Korea that has grown increasingly active in recent years. The group is primarily focused on cryptocurrency theft, targeting freelance developers across Windows, Linux, and macOS platforms. The newly published research paper traces the group’s evolution from early malware families to more advanced toolsets. These campaigns rely heavily on sophisticated social engineering tactics, including fake job interviews and the ClickFix technique, to deliver malware and exfiltrate cryptocurrency. ESET also analyzed open-source intelligence (OSINT) data that sheds light on the operations of North Korean IT workers involved in fraudulent employment schemes and their ties to DeceptiveDevelopment. These findings are being presented today at the annual Virus Bulletin (VB) Conference.

DeceptiveDevelopment is a North Korea-aligned group active since at least 2023, focused on financial gain. The group targets software developers on all major systems – Windows, Linux, and macOS – and especially those in cryptocurrency and Web3 projects. Initial access is achieved exclusively via various social engineering techniques like ClickFix, and fake recruiter profiles similar to Lazarus’s Operation DreamJob to deliver trojanized codebases during staged job interviews. Its most typical payloads are the BeaverTail, OtterCookie, and WeaselStore infostealers, and the InvisibleFerret modular RAT.

“DeceptiveDevelopment operators use fake recruiter profiles on social media, in a fashion similar to Lazarus’s Operation DreamJob. However, in this case, they specifically reached out to software developers, often those involved in cryptocurrency projects, providing potential victims with trojanized codebases that deploy backdoors as part of a faux job interview process,” says Peter Kálnai, one of the co-authors of the research paper. “The individuals behind all these activities trade high-end technical sophistication for a broad scale of operations and highly creative social engineering. Their malware is mostly simple, yet they manage to lure even tech-savvy targets,” adds Kálnai.

The attackers opted for various methods to compromise users, relying on clever social engineering tricks. Via both fake and hijacked profiles, they pose as recruiters on platforms like LinkedIn, Upwork, Freelancer.com, and Crypto Jobs List. They offer fake lucrative job opportunities in order to attract their target’s interest. Victims are requested to participate in a coding challenge or pre-interview task.

In addition to fake recruiter accounts, the attackers have customized and improved the social engineering method called ClickFix. Victims are lured to a fake job interview site and asked to fill out a detailed application form, investing significant time and effort. At the final step, they’re prompted to record a video answer, but the site displays a camera error and offers a “How to fix” link. This link instructs users to open a terminal and copy a command that should solve the camera or microphone issue, which instead of fixing the issue, downloads and executes malware.

While research into DeceptiveDevelopment is primarily based on data from ESET telemetry and reverse-engineering the group’s toolset, it is interesting to point out its connections to fraud operations by North Korean IT workers. According to the FBI’s “Most Wanted” poster, the IT worker campaign has been ongoing since at least April 2017 and has become increasingly prominent in recent years. In a joint advisory released in May 2022, the IT worker campaign is described as a coordinated effort by North Korea-aligned workers to gain employment at overseas companies, whose salaries are then used as funding for the regime. They have also been known to steal internal company data and use it for extortion, as stated in an announcement by the FBI in January 2025.

As ESET Research discovered from available OSINT data, fake CVs, and other related materials, the IT workers mainly focus on employment and contract work in the West, specifically prioritizing the United States. However, our findings based on the acquired materials have shown a shift toward Europe, with targets in countries such as France, Poland, Ukraine, and Albania. The workers utilize AI to perform their job tasks and rely heavily on AI for manipulating photos in their profile pictures and CVs, and even perform face swaps in real-time video interviews to look like the persona they are currently using. They utilize remote interviewing platforms like Zoom, MiroTalk, FreeConference, or Microsoft Teams for various social engineering techniques. Proxy interviewing poses a severe risk to employers, since hiring of an illegitimate employee from a sanctioned country may not only be irresponsible or underperforming, but could also evolve into a dangerous insider threat.

“The activities of North Korean IT workers constitute a hybrid threat. This fraud-for-hire scheme combines classical criminal operations, such as identity theft and synthetic identity fraud, with digital tools, which classify it as both a traditional crime and a cybercrime,” comments Kálnai.

The research paper “DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception” summarizes the evolution of the group’s two flagship toolsets, InvisibleFerret and BeaverTail. At the same time, it identifies newly discovered links between DeceptiveDevelopment’s Tropidoor backdoor and the PostNapTea RAT used by the Lazarus group. Furthermore, it provides a comprehensive analysis of TsunamiKit and WeaselStore, new toolkits used by DeceptiveDevelopment and documents the functionality of a WeaselStore C&C server and its API.

For a more detailed analysis of DeceptiveDevelopment operations and tools, check out the latest ESET Research white paper “DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception” or the brief accompanying blogpost on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

About ESET

ESET® provides cutting-edge cybersecurity to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown — securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts and blogs.

Image: https://www.globenewswire.com/newsroom/ti?nf=OTUzNDgxMiM3MTYzODQ0IzIyMjY2NjE=

Image: https://ml.globenewswire.com/media/NDY3NGI2YTAtNGI1YS00MjQxLTkzOTktZGQxOGMyYzMxMTIzLTEyMzgyMTQtMjAyNS0wOS0yNS1lbg==/tiny/ESET-LLC.png Media contact:

Jessica Beffa

[email protected]

720-413-4938 Image: Primary Logo

Source: ESET

Comments
Welcome to financetom comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
Related Articles >
Remsoft Acquires Australian Forestry Tech Firm LOGR, Expanding Global Forest Intelligence Platform
Remsoft Acquires Australian Forestry Tech Firm LOGR, Expanding Global Forest Intelligence Platform
Oct 20, 2025
Acquisition strengthens Canadian company's end-to-end forestry planning, operations, and sustainability solutions FREDERICTON, NB, Oct. 20, 2025 /PRNewswire/ - October 20, 2025 – Remsoft, a global leader in Forest Intelligence solutions, has acquired LOGR, an Australian forestry technology company known for its innovative real-time data capture and operational multi-party analytics platform. The acquisition advances Remsoft's strategy to build a unified, cloud-based ecosystem...
Classiq Partners with QUCAN to Deliver Hands-On Quantum Training Globally
Classiq Partners with QUCAN to Deliver Hands-On Quantum Training Globally
Oct 20, 2025
TEL AVIV, Israel, Oct. 20, 2025 (GLOBE NEWSWIRE) -- Classiq, the leading quantum software company, today announced a partnership with QUCAN to support QC101, a two-month introductory quantum computing training program. Designed to bridge academia and industry, the next cohort begins Friday, October 24, 2025, with registration now open. Image: QUCAN A Media Snippet accompanying this announcement is available by clicking...
IDI Announces Integration with TazWorks to Expand Access to IDI’s Best-in-Class Identity Intelligence in the Background Screening Industry
IDI Announces Integration with TazWorks to Expand Access to IDI’s Best-in-Class Identity Intelligence in the Background Screening Industry
Oct 20, 2025
BOCA RATON, Fla., Oct. 20, 2025 (GLOBE NEWSWIRE) -- Interactive Data, LLC (“IDI”), a red violet company and leader in identity verification and risk mitigation, today announced an agreement for a new integration with TazWorks™, the creators of TazCloud™, a leading independent technology platform for the background screening industry and part of MeridianLink ( MLNK ), a leading provider of...
Eyelit Technologies Recognized as a Major Player in the 2025 IDC MarketScape for Worldwide Advanced Planning and Scheduling (APS) Software Providers
Eyelit Technologies Recognized as a Major Player in the 2025 IDC MarketScape for Worldwide Advanced Planning and Scheduling (APS) Software Providers
Oct 20, 2025
IDC highlights Eyelit Technologies’ integrated approach to unifying SIOP, APS, and MES into a single, AI-driven platform. HOLMDEL, N.J.--(BUSINESS WIRE)-- Eyelit Technologies (Eyelit), a leader in optimized planning, scheduling, and execution systems for manufacturers, announces that it has been positioned as a Major Player in the 2025 IDC MarketScape: Worldwide Advanced Planning and Scheduling Software Providers. The report highlights Eyelit’s...
Copyright 2023-2025 - www.financetom.com All Rights Reserved