North Korean job scammers target JavaScript and Python developers with fake interview tasks spreading malware



  • Lazarus Group evolving Operation Dream Job campaign to target Web3 developers
  • New “Graphalgo” variant uses malicious dependencies in legitimate bare-bone projects on PyPI/npm
  • ReversingLabs found ~200 malicious packages spoofing libraries like graphlib, aiming to steal crypto

The notorious Lazarus gang is evolving its Operation Dream Job campaign to target even more software developers and steal even more crypto along the way.

Security researchers ReversingLabs claim to have seen changes to the campaign starting May 2025, dubbed ‘Graphalgo’, which sees Lazarus take a legitimate bare-bone project, and adds a malicious dependency which they use in the attack.


https://cdn.mos.cms.futurecdn.net/PcYLLwL2xvYvPfjEXYpZrD-2122-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img