Press ESC to close

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99

SectionDetails
Threat ActorsLazarus Group (North Korea-linked)
Campaign OverviewOperation 99 targets freelance Web3 and cryptocurrency developers using fake recruiters and malicious GitLab repositories to deliver malware.
Target Regions (Victims)• Italy (primary concentration)
• Argentina, Brazil, Egypt, France, Germany, India, Indonesia, Mexico, Pakistan, Philippines, U.K., U.S. (secondary concentration)
Methodology• Fake recruiters on LinkedIn luring developers.
• Victims clone malicious GitLab repositories that connect to C2 servers.
• Malware is deployed to steal sensitive data.
Product TargetedWeb3 and cryptocurrency development environments
Malware ReferenceMain5346, Main99 (downloader), Payload99/73, Brow99/73, MCLIP
Tools UsedFake LinkedIn profiles, Malicious GitLab repositories
Vulnerabilities ExploitedSocial engineering tactics (fake recruiters and GitLab links)
TTPs• Fake recruitment tactics via LinkedIn.
• Malware embedded in cloned GitLab repositories.
• Modular malware design capable of targeting multiple OS platforms.
AttributionLazarus Group (North Korea)
Recommendations• Avoid clicking links from untrusted recruiters.
• Use strong endpoint security to detect and block malicious repositories.
• Monitor development environments for unauthorized access.
SourceThe Hackers News

Read full article: https://thehackernews.com/2025/01/lazarus-group-targets-web3-developers.html

The above summary has been generated by an AI language model

Stay Updated with Our Newsletter

  

Source: TheHackersNews

Published on: January 15, 2025

Leave a Reply

Your email address will not be published. Required fields are marked *