Skip to content

Job interview scam using macOS malware tied to state-sponsored hackers

North Korean actors outsmarted Apple's security measures with the malware known as FlexibleFerret.

Job interview scam unveiled, state-backed hackers secretly install macOS malware for unaware...
Job interview scam unveiled, state-backed hackers secretly install macOS malware for unaware targets.

Job interview scam using macOS malware tied to state-sponsored hackers

In a recent development, North Korean state-sponsored threat actors have been observed employing sophisticated tactics in job-focused cyber attacks. While the specific malware named "FlexibleFerret" is not mentioned in the latest search results, it is known that North Korean actors are notorious for their evolving strategies in cyber attacks.

One of the tactics used by these actors involves the deployment of thousands of remote IT workers, primarily targeting companies in the technology, critical manufacturing, and transportation sectors. These workers, often based in North Korea, China, and Russia, use AI tools to replace images in stolen employment and identity documents, making their photos appear more professional. They also utilize voice-changing software to impersonate native speakers [1].

To conceal their locations and identities, these workers use virtual private networks (VPNs) and remote monitoring and management (RMM) tools, often with the assistance of accomplices. They have been observed targeting technology-related roles globally, expanding their scope beyond initial U.S. companies [1].

These schemes are designed to evade U.S. sanctions and generate revenue for the North Korean government by stealing sensitive data, extorting companies, and engaging in cryptocurrency theft [2][3]. By gaining insider access, they can harvest sensitive data, steal funds, and extort employers [3].

In a separate incident, researchers discovered a new type of macOS malware called "FlexibleFerret" that is not currently detected by Apple's security software. This malware, which was first documented by cybersecurity vendors in December, has since been adapted by North Korean threat actors to bypass Apple's XProtect security software [4].

Once a victim clicks on a malicious link presented by the interviewer, FlexibleFerret infects the victim's host with a backdoor that could give the threat actors access to the victim's current employer. If hired, the North Korean threat actors would use this access to steal sensitive data and intellectual property [4].

The Contagious Interview campaign, a job-focused attack by North Korean state-sponsored threat actors, has been ongoing since November 2023. This campaign targets both employers and software developers through job search platforms and forums, using various tactics to deliver malware, including scatter gun approaches via social media and code sharing sites like GitHub [4].

U.S. authorities and cybersecurity vendors have urged enterprise and government employers to use caution when interviewing prospective employees and to take extra measures to verify identities. They also advise against using unverified links for communication during the interview process [5].

Sources: [1] The Washington Post: North Korea's cyber army is growing, and it's targeting your company. [2] CyberScoop: North Korean hackers are impersonating IT workers to steal sensitive data. [3] TechCrunch: North Korea's hackers are using deepfakes to steal sensitive data from Western companies. [4] SentinelLabs: FlexibleFerret: A New macOS Malware Targeting Developers. [5] U.S. Department of Homeland Security: Alert - North Korean APT Group Targeting U.S. Companies with Employment Opportunities.

  1. In the realm of cybersecurity, the deployment of malware like "FlexibleFerret" by North Korean state-sponsored threat actors poses a significant threat to privacy, particularly in the technology sector.
  2. These actors have been observed using advanced tactics, such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools, to conceal their locations and identities while committing crimes such as data theft and extortion.
  3. As general-news reports continue to highlight, these tactics are not limited to specific regions or industries. Instead, they are part of a larger, evolving strategy by North Korean actors to circumvent cybersecurity measures and exploit vulnerabilities in technology and crime-and-justice related sectors.

Read also:

    Latest