Was this helpful?
Thumbs UP Thumbs Down

Fake Tech Jobs Used by North Korean Hackers

Find Job key on a keyboard
Global communication

Watch Out for Fake Job Offers

Imagine landing your dream job only to discover it’s a scam designed to steal your money and personal info. Hackers are using fake job interviews to trick software developers into downloading malware. These scams can look incredibly real, complete with recruiter profiles and professional websites.

North Korean hackers are behind these attacks, targeting people around the world. Their goal is to steal login details, cryptocurrency wallets, and even company secrets.

Headhunters interviewing female job candidate

A Cyber Heist Disguised as a Job Interview

Hackers aren’t just after job seekers. They’re after their digital lives. These scams often start on freelancing sites, where developers are lured with high-paying gigs. They’re asked to fix a bug or test a project, but malware is hidden inside the code.

Once the file is opened, it gives hackers full access to a victim’s computer. They can steal files, log keystrokes, and even take over accounts.

Mysterious man in a hood hacking a game

The Names Behind the Scam

Cybersecurity experts have identified this hacking campaign as “DeceptiveDevelopment.” It may sound like a tech startup, but it is a cybercrime operation linked to North Korea.

Previous attacks have gone by names like Contagious Interview, PurpleBravo, and Tenacious Pungsan. The goal remains the same: stealing as much as possible before getting caught.

Fiverr logo is displayed on a smartphone platform offering services

Where Do These Scams Happen

Job-hunting platforms are a goldmine for hackers. Popular sites like Fiver, Upwork, Freelancer.com, and even LinkedIn have been used to target victims. Some scammers set up fake companies with convincing job postings.

They also send direct messages to developers, pretending to be recruiters from real companies. These scammers often create polished profiles with company logos and legitimate job descriptions.

Malware logo displayed on phone.

Malware Hidden in Job Assignments

Hackers are getting creative with their tricks. Instead of sending obvious virus files, they embed malware inside coding projects. You might be asked to test a crypto app, fix a bug, or improve an existing program.

Everything looks normal until you run the project. That’s when the malware activates, giving hackers control over your system.

Executive manager having remote conversation with team during online videocall

Fake Video Calls That Install Malware

Another sneaky trick? Fake video conferencing apps. Scammers convince victims to install a “required” program for their job interview, but the software is malware. Once installed, it silently steals personal data and login credentials.

Hackers have been known to create fake video conferencing applications to trick users into installing malware, thereby gaining access to passwords, files, and browser history.

Business people at meeting

Meet the Malware

BeaverTail and InvisibleFerret may sound like cartoon characters, but they are dangerous malware programs. BeaverTail starts the attack by installing InvisibleFerret, which steals personal data, login credentials, and financial information.

These programs can log keystrokes, access cryptocurrency wallets, and even control an infected device.

Apple Macbook

A Special Malware for Mac Users

A new type of Mac malware targeting job seekers has been discovered, employing sophisticated techniques to infiltrate systems. This malicious program disguises itself as a legitimate job-related software update.

Unlike older malware, FlexibleFerret was signed with an Apple Developer ID, making it appear trustworthy. Once installed, it grants hackers remote access to a victim’s files, login information, and online accounts.

Flags of developing nations.

The Global Targets of This Scam

This cybercrime wave isn’t just hitting one country; it’s worldwide. Developers in the U.S., India, Finland, Italy, and many others have been affected. The hackers don’t limit their attacks to specific locations.

More victims mean a higher chance of stealing valuable data. Cybercriminals are also targeting developers working in cryptocurrency and decentralized finance, industries that handle large amounts of digital money.

Central committee building In North Korea

North Korea’s Bigger Plan

Why is North Korea behind these attacks? The stolen money and data help fund the country’s economy and military programs. This is not just about scamming individuals; it’s part of a larger strategy to finance the regime.

Some North Korean nationals pretend to be job seekers themselves. They apply for remote jobs under fake identities and then secretly work for the government.

Github logo displayed on a phone screen

Hacking Through GitHub

GitHub is a popular site for developers and a hacker playground. Scammers post fake coding projects or open issues in real repositories to spread malware. These malicious repositories are often made private to hide them from security researchers.

Some developers are tricked into providing their account details to access these projects. Once inside, hackers can inject harmful code that activates when the project is built.

Deepfake and AI false identity in making

The Deepfake Job Scam

Some hackers go a step further by using deepfake technology. They create fake video resumes or job interviews to appear more convincing. These AI-generated identities make it harder to spot scammers.

It could be a deepfake if a video interview seems off, like a delayed voice, unnatural blinking, or strange facial movements. Cybercriminals use these techniques to appear more legitimate and gain trust before attacking.

Find Job key on a keyboard

How Job Seekers Can Stay Safe

If you’re looking for a job, be skeptical of too-good-to-be-true offers. Never download files from unknown recruiters, and avoid clicking on suspicious links. Taking a moment to verify an opportunity can protect you from a cyberattack.

Stick to well-known job platforms, and research any company before accepting an interview. Check the company’s official website and confirm the recruiter’s identity.

Social media apps: Facebook and Instagram

How Hackers Use Social Media to Find Victims

Social media isn’t just for connecting with friends; it’s also a hunting ground for cybercriminals. Hackers create fake recruiter profiles on LinkedIn, Twitter, and Telegram to target job seekers.

Once they establish contact, they guide victims toward downloading malicious files or clicking on harmful links. Some even impersonate well-known recruiters from major tech firms to appear more convincing.

A man hacking on laptop

Why Crypto Developers Are Key Targets

Hackers don’t just target software developers, they specifically go after those working in cryptocurrency and blockchain technology. These industries handle large amounts of digital assets, making them an attractive target for cybercriminals looking to steal funds.

Malicious actors infiltrate blockchain projects by posing as developers or investors, offering fake partnerships and job opportunities.

Want to see how tech is shaking up other industries? Check out these 16 game-changing innovations in agriculture.

Programming code displayed on computer's screen.

The Rise of Fake Coding Challenges

One of the newest tricks in these scams is using fake coding tests as bait. Job seekers are invited to complete technical assessments, believing they are part of the interview process. However, these “challenges” secretly contain hidden malware within the provided code or scripts.

The malware infects their system once a candidate downloads and runs the assignment. This method is especially effective because developers naturally expect to write and run code during a technical evaluation.

Do you think coding tests are always harmless? Check out The Shocking Truth About Website Images to see how hidden threats lurk in plain sight.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.