×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Eset
  • DeceptiveDevelopment, the new investigation by ESET Research into North Korean cybercrime linked to the theft of cryptocurrencies

Customer Press Room

DeceptiveDevelopment, the new investigation by ESET Research into North Korean cybercrime linked to the theft of cryptocurrencies

by Grandangolo Communications / Monday, 06 October 2025 / Published in Eset

ESET Research has analyzed social engineering campaigns based on fake job interviews and the ClickFix technique, linked to North Korean IT workers involved in fraudulent hiring practices and cryptocurrency theft, presented in a new white paper

Researchers of ESET, a global European leader in the cybersecurity market, have released new findings on DeceptiveDevelopment, also known as Contagious Interview: a North Korea-aligned threat group that has intensified its activities in recent years. The group has as its main objective the theft of cryptocurrencies and targets freelance developers on Windows, Linux and macOS.

The new white paper reconstructs the evolution of the group, from the first malware to more advanced toolsets. The identified campaigns rely on particularly ingenious social engineering techniques, such as fake job interviews and ClickFix, a methodology that leads victims to execute malicious commands under the guise of solving technical problems, allowing attackers to distribute malware and exfiltrate cryptocurrency. In parallel, ESET analyzed open-source intelligence (OSINT) data linking North Korean IT operators, perpetrators of fraudulent hiring practices, to the DeceptiveDevelopment group. The findings were presented at the annual Virus Bulletin (VB) conference.

Active since at least 2023, DeceptiveDevelopment is a group aligned with North Korea addicted to theft of cryptocurrencies. It affects software developers operating on all major operating systems – Windows, Linux and macOS – with a particular focus on cryptocurrency and Web3 projects. Initial access is gained through social engineering techniques, including ClickFix and the use of fake recruiter profiles, similar to those already employed by the Lazarus group in the DreamJob operation, by which code packages containing Trojans are distributed during simulated interviews. The most recurring payloads are the infostealers BeaverTail, OtterCookie and WeaselStore, as well as the modular backdoor InvisibleFerret RAT.

"The operators of DeceptiveDevelopment use fake recruiter profiles on social media, similar to the Lazarus Group's DreamJob operation. In this case, however, they specifically target software developers, often involved in crypto projects, by providing them with code packages containing Trojans that install backdoors as part of a fake selection process," explains Peter Kálnai, co-author of the white paper. "The actors behind these operations give up extreme technical sophistication in favor of large-scale operations and very creative social engineering. Their malware is relatively simple, but they still manage to target even experienced targets," adds Kálnai.

Attackers use various methods to compromise victims, using social engineering techniques. Through fake or compromised profiles, they pose as recruiters on platforms such as LinkedIn, Upwork, Freelancer.com and Crypto Jobs List, offering attractive job offers. Victims are asked to complete a programming challenge or pre-interview task.

In addition to fake profiles, attackers have adapted and perfected the ClickFix technique. Victims are directed to a fake interview site and asked to fill out a detailed form, which takes time and energy. At the end of the process, they are asked to record a video response, but the site shows a camera error and offers a “How to fix” link. Following the instructions, victims open a terminal and copy a command that, instead of solving the supposed problem, downloads and executes malware on the device.

Although the study on DeceptiveDevelopment is based mainly on ESET telemetry data and technical analysis of the group's toolset, links emerge with fraudulent operations conducted by North Korean IT operators. According to the FBI, this campaign has been active since at least 2017 and has become increasingly relevant. In a joint statement from May 2022 it is described as an operation coordinated by operators aligned with North Korea to obtain jobs in foreign companies, with salaries intended to finance the regime. Additionally, in a January 2025 announcement, the FBI reported cases of theft of internal company data, which was later used for extortion.

From the analysis of OSINT data, fake CVs and other materials, ESET Research found that these operators are mainly targeting the US market, but recently the focus has also shifted to Europe, with targets in France, Poland, Ukraine and Albania. These profiles use AI to carry out work tasks, manipulate photos for CVs and profiles, and even perform real-time face swaps during video interviews, taking on the appearance of the identity used. They leverage platforms such as Zoom, MiroTalk, FreeConference and Microsoft Teams to carry out various social engineering techniques. Proxy interviewing represents a significant risk for companies, as hiring illegitimate staff from sanctioned countries can not only reduce performance, but can also result in a serious internal threat.

"The activities of North Korean IT operators constitute a hybrid threat. This fraudulent commission scheme combines classic criminal practices, such as identity theft and the creation of synthetic identities, with digital tools, placing it halfway between traditional crime and cybercrime," observes Kálnai.

The white paper “DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception” traces the evolution of the group's two main toolsets, InvisibleFerret and BeaverTail. It also highlights links between the Tropidoor backdoor and the PostNapTea RAT, already used by the Lazarus group. It also analyzes in detail TsunamiKit and WeaselStore, the new DeceptiveDevelopment toolkits, documenting the operation of a C&C WeaselStore server and the related API.

Tagged under: Eset

About Grandangolo Communications

What you can read next

ESET discovers FamousSparrow, an APT group that spies on hotels, government agencies and private companies
ESET confirms itself as Champion in the Cybersecurity Leadership Matrix 2020
ESET discovers NGate: Android malware that uses the NFC module to clone victims' credit and debit cards

Customer Press Room

  • Acronis Introduces MDR by Acronis TRU to Offer MSPs 24/7 Threat Detection and Response

    The service allows MSPs to offer customers...
  • SentinelOne expands strategic partnership with Google Cloud to deliver AI-powered autonomous security on a global scale

    The partnership will lead to the development of new...
  • Vertiv Announces Expansion of Manufacturing Capacity in Infrastructure Solutions, Energy and Rack Systems to Meet Growing Demand

    New and expanded production facilities in America...
  • Eon and SentinelOne partner to improve cloud data security and AI resilience

    The combination of features will broaden the ...
  • Vertiv expands thermal portfolio with new wall cooling system for edge and small data rooms in EMEA

    Designed to operate 24/7 in busy environments...

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • abstract
  • Abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Innovaway
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP