More

    North Korean job scammers target JavaScript and Python developers with fake interview tasks spreading malware



    • Lazarus Group evolving Operation Dream Job campaign to target Web3 developers
    • New “Graphalgo” variant uses malicious dependencies in legitimate bare-bone projects on PyPI/npm
    • ReversingLabs found ~200 malicious packages spoofing libraries like graphlib, aiming to steal crypto

    The notorious Lazarus gang is evolving its Operation Dream Job campaign to target even more software developers and steal even more crypto along the way.

    Security researchers ReversingLabs claim to have seen changes to the campaign starting May 2025, dubbed ‘Graphalgo’, which sees Lazarus take a legitimate bare-bone project, and adds a malicious dependency which they use in the attack.


    https://cdn.mos.cms.futurecdn.net/PcYLLwL2xvYvPfjEXYpZrD-2122-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img