North Korean remote workers landing jobs in the West

Nov. 6, 2024, 11:34 a.m.

Description

North Korean threat actors are utilizing Contagious Interview and WageMole campaigns to secure remote employment in Western countries, evading financial sanctions. The Contagious Interview campaign has been updated with improved script obfuscation and multi-platform support, targeting over 100 devices across various operating systems. The campaign steals sensitive data, including source code and cryptocurrency information. WageMole leverages stolen data to create fake identities, using generative AI to acquire and perform jobs. The actors aggressively target developers through social media and job platforms, focusing on web, cryptocurrency, and AI roles. They use sophisticated techniques to bypass background checks and secure legitimate remote positions, particularly in small to mid-sized businesses.

Date

  • Created: Nov. 6, 2024, 11:06 a.m.
  • Published: Nov. 6, 2024, 11:06 a.m.
  • Modified: Nov. 6, 2024, 11:34 a.m.

Indicators

  • w3capi.marketing
  • d801ad1beeab3500c65434da51326d7648a3c54923d794b2411b7b6a2960f31e
  • f3ead5405456b1d0a176c817bda8096c16a2c33df51526084fed6a4f46f9e636
  • f06323e253b5dd6a2759ffd04452241c2a4020115aece5fc02da90918a53cf7b
  • da8e2c248dbb92e62fa3d270ac3d32e52e23827e452bab5d945dd7f3cbd9851a
  • bf411c4d1275136d29cb001a1521f49c67f86fe944f97ea5352d18996fce60e7
  • bc2a2efcb085d209e1358d2bfe57cd348c4b8f6f3f02fb0ee80e688a9ec3a318
  • bc20cd53badb77404b2f82ea9107f7d9e9c7e4a0ebd8793a52227ea887d91ba7
  • 720df4162feaa5ca1cbf19b4d30a7b7c5ea2e0128e6a4978c448d2ccb78e5f1b
  • 6c905ea5c116aabf9328b314a1d32538206113b9a2c700e6d1490df46e65ee94
  • de6f9e9e2ce58a604fe22a9d42144191cfc90b4e0048dffcc69d696826ff7170
  • fd9e8fcc5bda88870b12b47cbb1cc8775ccff285f980c4a2b683463b26e36bf0
  • dcde59721b78e6797ee7f79c0e19c4a1c5a7806d20cbfa4a6ebb8efca189baf3
  • d8806fb404bf29e4a3941c912cbb48553ad5340e1b7195a94e6abf8d75b9102c
  • d5c0b89e1dfbe9f5e5b2c3f745af895a36adf772f0b72a22052ae6dfa045cea6
  • d502f822e6c52345227b64e3c326e2dbefdd8fc3f844df0821598f8d3732f763
  • cd13a9c92210ada940a44769874dd6716f85c4e4e9d7323ec5789c7b253d937d
  • c0110cb21ae0e7fb5dec83ca90db9e250b47a394662810f230eb621b0728aa97
  • b8e69d6a766b9088d650e850a638d7ab7c9f59f4e24e2bc8eac41c380876b0d8
  • b378d389fd31c6cb65fc85ea960b609049c5f97266cafcbfc6d261fa09355cc0
  • 9e3a9dbf10793a27361b3cef4d2c87dbd3662646f4470e5242074df4cb96c6b4
  • 9abf6b93eafb797a3556bea1fe8a3b7311d2864d5a9a3687fce84bc1ec4a428c
  • 9110515c2d5f6f48871f0631f411d55f2f0307286e6678952f5d86abe5ce11a9
  • 36cac29ff3c503c2123514ea903836d5ad81067508a8e16f7947e3e675a08670
  • 24b89c77eaeebd4b02c8e8ab6ad3bd7abaa18893ecd469a6a04eda5e374dd305
  • 0f5f0a3ac843df675168f82021c24180ea22f764f87f82f9f77fe8f0ba0b7132
  • 0621d37818c35e2557fdd8a729e50ea662ba518df8ca61a44cc3add5c6deb3cd
  • 000b4a77b1905cabdb59d2b576f6da1b2ef55a0258004e4a9e290e9f41fb6923
  • bc4a082e2b999d18ef2d7de1948b2bfd9758072f5945e08798f47827686621f2
  • 45c991529a421104f2edf03d92e01d95774bf54325f9107dd4139505912a0c1e
  • 33617f0ac01a0f7fa5f64bd8edef737f678c44e677e4a2fb23c6b8a3bcd39fa2
  • 67.203.7.163
  • 23.254.244.242
  • 23.106.253.215
  • 23.106.253.209
  • 166.88.132.39
  • 135.181.242.24
  • 95.164.17.24
  • 45.140.147.208
  • 23.106.253.194
  • 185.235.241.208
  • 172.86.97.80
  • 172.86.123.35
  • 167.88.168.152
  • 147.124.214.129
  • 147.124.213.11
  • 147.124.213.29
  • 147.124.212.89
  • 147.124.212.146
  • 67.203.7.245
  • 147.124.214.237
  • 67.203.7.171
  • 147.124.214.131
  • payloadrpc.com
  • regioncheck.net
  • mirotalk.net

Attack Patterns

  • BeaverTail
  • InvisibleFerret
  • North Korean threat actors

Additional Informations

  • Construction
  • Retail
  • Technology
  • Healthcare
  • Defense
  • Finance
  • Estonia
  • British Indian Ocean Territory
  • Nigeria
  • Kenya
  • India
  • Spain
  • Japan
  • Pakistan
  • United Kingdom of Great Britain and Northern Ireland
  • United States of America
  • Russian Federation