Firewall Daily

Fake Jobs on Coinbase: Espionage Campaign by Lazarus Group

North Korea-backed cyber-criminal gang, Lazarus group has launched a fake job campaign for candidates on LinkedIn. Lazarus Group or Whois Team targets job seekers who use Apple’s Mac devices that run on Intel and M1 chipsets. The job details were uploaded to VirusTotal from Brazil. The descriptions have Mac executable codes camouflaged for the position of engineering manager.

Spying efforts targeted toward specific candidates

Job seekers are lured toward phishing emails with fake promises like a position at a popular cryptocurrency exchange operator, Coinbase. Researchers at ESET found that the phishing links on these emails can spy on the users and can affect both Intel and Apple Silicon. This malware uses Interception.dll and can be effectively executed on several Mac devices.

Infected files sent in fake job emails

The fake job offers have other files including a PDF document and two other executables. The executables include FinderFontsUpdater.app and safarifontsagent.

A screenshot of the job offer was posted by ESET on its Twitter that read, “We’re Coinbase. We’re the world’s most trusted way to join the crypto revolution, serving more than 89 million accounts in more than 100 countries…. we look for candidates who will thrive in a culture like ours, where we default to trust, embrace feedback, and disrupt ourselves.” The job offer is worded like those that are crafted by most companies on their websites. The candidates are enticed by the language, job description, and perks that most companies use.

Action by Apple after being notified about fake job malware

The certificate that was used to spread the malware on Apple devices is revoked by Apple since ESET alerted the company. However, the malware may become effective if users who do not know about the fake job offers allow permissions to malicious apps by changing their device settings.

Past crime report of Lazarus Group

ESET further mentioned in its tweet that this spying campaign is part of Lazarus’s ongoing Operation In(ter)caption campaign. The Advanced Persistent Threat (APT) actor has been in eyes of cybersecurity departments across the globe for years.

 

thecyberexpress

Recent Posts

The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

AI fraud, deepfake probes, SME cyber warnings, and ransomware cases highlight rising global risks in this week’s Cyber Express roundup.

2 days ago

French National Bank Authority Breach Exposed 1.2 Million Accounts

French national bank authority confirmed a major data breach affecting 1.2 million bank accounts after a malicious actor stole credentials…

2 days ago

What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

The real success of AI will not only depend on how powerful the technology becomes, but on how safely, fairly,…

2 days ago

Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

Israel data breach totals two petabytes, with phishing up 35% and cyber influence attacks rising 170%, says Yossi Karadi.

2 days ago

Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center

The UMMC cyberattack halted surgeries, closed clinics statewide and triggered a federal probe into potential patient data exposure.

2 days ago

First Android Malware Weaponizes Gemini AI to Evade Detection, Maintain Persistence

ESET researchers discovered PromptSpy, the first known Android malware to integrate generative AI directly into its execution flow, marking a…

3 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More