DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware

Oct. 10, 2024, 8:07 a.m.

Description

DPRK-associated threat actors are targeting tech industry job seekers through fake recruitment campaigns, installing malware on their devices. The campaign, named CL-STA-240 Contagious Interview, uses social engineering to lure victims into online interviews where they are convinced to download malicious software. The attackers have updated two key pieces of malware: BeaverTail, a cross-platform downloader and infostealer, and InvisibleFerret, a Python backdoor. BeaverTail, now compiled using Qt framework, targets both macOS and Windows platforms, with enhanced capabilities including cryptocurrency wallet theft. InvisibleFerret enables remote control, keylogging, and data exfiltration. The campaign poses risks to individuals and potentially to the companies employing targeted job seekers.

Date

  • Created: Oct. 9, 2024, 3:39 p.m.
  • Published: Oct. 9, 2024, 3:39 p.m.
  • Modified: Oct. 10, 2024, 8:07 a.m.

Attack Patterns

  • BeaverTail
  • InvisibleFerret
  • DPRK
  • T1059.006
  • T1119
  • T1497
  • T1087
  • T1056.001
  • T1555
  • T1005
  • T1016
  • T1082
  • T1105
  • T1083
  • T1071
  • T1543
  • T1219
  • T1204
  • T1132
  • T1041
  • T1566
  • T1078

Additional Informations

  • Technology