North Korean hackers are using LinkedIn to entice developers to coding challenges – here’s what you need to know


- Slow Pisces targets crypto developers with bad code disguised as stock analysis tools
- Malicious code hides in plain sight, using GitHub projects and YAML deserialization tricks
- Victims unknowingly install RN Loader and RN Stealer through rigged Python repositories
A hacker group from North Korea known as Slow Pisces has launched a sophisticated campaign targeting developers in the cryptocurrency sector through LinkedIn.
The group, also known as TraderTraitor or Jade Sleet, poses as recruiters to lure victims with seemingly genuine job offers and coding challenges, only to infect their systems with malicious Python and JavaScript code.
Thanks to this campaign, the group has been able to steal substantial amounts of cryptocurrency. In 2023 alone, they were linked to over $1 billion in stolen funds. A $1.5 billion hack at a Dubai exchange and a $308 million theft from a Japanese company are among the recent attacks.
Coders beware!
After initially sending PDF documents containing job descriptions, the malicious actors follow up with coding assignments hosted on GitHub.
Although these repositories appear to be based on legitimate open-source projects, they have been secretly altered to include hidden malware.
Victims, believing they are completing programming tests, unintentionally allow malware like RN Loader and RN Stealer onto their systems.
These booby-trapped projects mimic legitimate developer tools and applications. For instance, Python repositories might seem to analyze stock market trends using data from reputable sources, while secretly communicating with attacker-controlled domains.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The malware evades most detection tools by using YAML deserialization, avoiding commonly flagged functions like eval or exec. Once triggered, the loader fetches and executes additional payloads directly in memory, making it difficult to detect or remove.
One such payload, RN Stealer, is specifically designed to exfiltrate credentials, cloud configuration files, and stored SSH keys, particularly from macOS systems.
JavaScript variants of the malware operate similarly, using the Embedded JavaScript templating engine to hide malicious code, which activates only for targeted victims based on factors like IP addresses or browser headers.
Forensic analysis shows that the malware stores code in hidden directories and communicates over HTTPS using custom tokens. However, investigators were unable to recover the full JavaScript payload.
GitHub and LinkedIn have responded by removing the malicious accounts and repositories involved.
“GitHub and LinkedIn removed these malicious accounts for violating our respective terms of service. Across our products, we use automated technology, combined with teams of investigation experts and member reporting, to combat bad actors and enforce terms of service. We continue to evolve and improve our processes and encourage our customers and members to report any suspicious activity,” the companies said in a joint statement.
There is a growing need for caution when approached with remote job offers and coding tests. Developers are advised to use strong antivirus software and run unfamiliar code in secure environments, particularly when working in sensitive sectors like cryptocurrency.
Those concerned about security should verify they are using the best IDEs, which typically include integrated security features. Staying alert, and working on a secure, controlled setup, can significantly reduce the risk of falling prey to state-backed cyber threats.
Via Unit42
You may also like
Slow Pisces targets crypto developers with bad code disguised as stock analysis tools Malicious code hides in plain sight, using GitHub projects and YAML deserialization tricks Victims unknowingly install RN Loader and RN Stealer through rigged Python repositories A hacker group from North Korea known as Slow Pisces has launched…
Recent Posts
- Google is scrapping its planned changes for third-party cookies in Chrome
- North Korean hackers are using LinkedIn to entice developers to coding challenges – here’s what you need to know
- OpenAI tells judge it would buy Chrome from Google
- Google Messages update finally adds an important safety tool – and teases a feature I’m surprised the app doesn’t have already
- Nissan’s GT-R set to return by 2030 as a plug-in hybrid
Archives
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010