Wednesday, February 11, 2026
  • About Web3Wire
  • Web3Wire NFTs
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Media Network
  • RSS Feed
  • Contact Us
Web3Wire
No Result
View All Result
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
No Result
View All Result
Web3Wire
No Result
View All Result
Home Artificial Intelligence

ESET Research’s deep dive into DeceptiveDevelopment, North Korean crypto theft via fake job offers

September 25, 2025
in Artificial Intelligence, Cryptocurrencies, GlobeNewswire, Web3
Reading Time: 8 mins read
5
SHARES
243
VIEWS
Share on TwitterShare on LinkedInShare on Facebook
  • ESET Research released a deep dive report into the activities of the DeceptiveDevelopment threat group and North Korean IT workers, which are considered tightly bound.
  • The analyzed campaigns rely heavily on sophisticated social engineering tactics, including fake job interviews and the ClickFix technique, to deliver malware and exfiltrate cryptocurrency with a possible secondary objective of cyberespionage.
  • ESET also analyzed OSINT data that sheds light on the operations of North Korean IT workers involved in fraudulent employment schemes.

PRAGUE and BRATISLAVA, Slovakia, Sept. 25, 2025 (GLOBE NEWSWIRE) — ESET Research has released new findings on DeceptiveDevelopment, also known as Contagious Interview – a threat group aligned with North Korea that has grown increasingly active in recent years. The group is primarily focused on cryptocurrency theft, targeting freelance developers across Windows, Linux, and macOS platforms. The newly published research paper traces the group’s evolution from early malware families to more advanced toolsets. These campaigns rely heavily on sophisticated social engineering tactics, including fake job interviews and the ClickFix technique, to deliver malware and exfiltrate cryptocurrency. ESET also analyzed open-source intelligence (OSINT) data that sheds light on the operations of North Korean IT workers involved in fraudulent employment schemes and their ties to DeceptiveDevelopment. These findings are being presented today at the annual Virus Bulletin (VB) Conference.

DeceptiveDevelopment is a North Korea-aligned group active since at least 2023, focused on financial gain. The group targets software developers on all major systems – Windows, Linux, and macOS – and especially those in cryptocurrency and Web3 projects. Initial access is achieved exclusively via various social engineering techniques like ClickFix, and fake recruiter profiles similar to Lazarus’s Operation DreamJob to deliver trojanized codebases during staged job interviews. Its most typical payloads are the BeaverTail, OtterCookie, and WeaselStore infostealers, and the InvisibleFerret modular RAT.

“DeceptiveDevelopment operators use fake recruiter profiles on social media, in a fashion similar to Lazarus’s Operation DreamJob. However, in this case, they specifically reached out to software developers, often those involved in cryptocurrency projects, providing potential victims with trojanized codebases that deploy backdoors as part of a faux job interview process,” says Peter Kálnai, one of the co-authors of the research paper. “The individuals behind all these activities trade high-end technical sophistication for a broad scale of operations and highly creative social engineering. Their malware is mostly simple, yet they manage to lure even tech-savvy targets,” adds Kálnai.

The attackers opted for various methods to compromise users, relying on clever social engineering tricks. Via both fake and hijacked profiles, they pose as recruiters on platforms like LinkedIn, Upwork, Freelancer.com, and Crypto Jobs List. They offer fake lucrative job opportunities in order to attract their target’s interest. Victims are requested to participate in a coding challenge or pre-interview task.

In addition to fake recruiter accounts, the attackers have customized and improved the social engineering method called ClickFix. Victims are lured to a fake job interview site and asked to fill out a detailed application form, investing significant time and effort. At the final step, they’re prompted to record a video answer, but the site displays a camera error and offers a “How to fix” link. This link instructs users to open a terminal and copy a command that should solve the camera or microphone issue, which instead of fixing the issue, downloads and executes malware.

While research into DeceptiveDevelopment is primarily based on data from ESET telemetry and reverse-engineering the group’s toolset, it is interesting to point out its connections to fraud operations by North Korean IT workers. According to the FBI’s “Most Wanted” poster, the IT worker campaign has been ongoing since at least April 2017 and has become increasingly prominent in recent years. In a joint advisory released in May 2022, the IT worker campaign is described as a coordinated effort by North Korea-aligned workers to gain employment at overseas companies, whose salaries are then used as funding for the regime. They have also been known to steal internal company data and use it for extortion, as stated in an announcement by the FBI in January 2025.

As ESET Research discovered from available OSINT data, fake CVs, and other related materials, the IT workers mainly focus on employment and contract work in the West, specifically prioritizing the United States. However, our findings based on the acquired materials have shown a shift toward Europe, with targets in countries such as France, Poland, Ukraine, and Albania. The workers utilize AI to perform their job tasks and rely heavily on AI for manipulating photos in their profile pictures and CVs, and even perform face swaps in real-time video interviews to look like the persona they are currently using. They utilize remote interviewing platforms like Zoom, MiroTalk, FreeConference, or Microsoft Teams for various social engineering techniques. Proxy interviewing poses a severe risk to employers, since hiring of an illegitimate employee from a sanctioned country may not only be irresponsible or underperforming, but could also evolve into a dangerous insider threat.

“The activities of North Korean IT workers constitute a hybrid threat. This fraud-for-hire scheme combines classical criminal operations, such as identity theft and synthetic identity fraud, with digital tools, which classify it as both a traditional crime and a cybercrime,” comments Kálnai.

The research paper “DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception” summarizes the evolution of the group’s two flagship toolsets, InvisibleFerret and BeaverTail. At the same time, it identifies newly discovered links between DeceptiveDevelopment’s Tropidoor backdoor and the PostNapTea RAT used by the Lazarus group. Furthermore, it provides a comprehensive analysis of TsunamiKit and WeaselStore, new toolkits used by DeceptiveDevelopment and documents the functionality of a WeaselStore C&C server and its API.

For a more detailed analysis of DeceptiveDevelopment operations and tools, check out the latest ESET Research white paper “DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception” or the brief accompanying blogpost on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

About ESET

ESET® provides cutting-edge cybersecurity to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown — securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit http://www.eset.com or follow our social media, podcasts and blogs.

About Web3Wire
Web3Wire – Information, news, press releases, events and research articles about Web3, Metaverse, Blockchain, Artificial Intelligence, Cryptocurrencies, Decentralized Finance, NFTs and Gaming.
Visit Web3Wire for Web3 News and Events, Block3Wire for the latest Blockchain news and Meta3Wire to stay updated with Metaverse News.

ShareTweet1ShareSendShare2
Previous Post

Bodor Laser Establishes Global Compliance Framework to Set New Standards in Laser Quality

Next Post

Julong Holding Limited Reports Unaudited Financial Results for the First Half of Fiscal Year 2025

Related Posts

Hatch selected by Maaden as partner to accelerate mining development in Saudi Arabia

RIYADH, Saudi Arabia, Feb. 11, 2026 (GLOBE NEWSWIRE) -- Hatch, a global leader in engineering, project delivery, and professional services, has been selected by Maaden (Saudi Arabian Mining Company) as its strategic delivery partner across a number of strategic growth projects. The partnership will implement a portfolio-wide approach to project...

Read moreDetails

Bitcoin Casino No Deposit Bonus: BC Poker Launches $5 Free Bonus With Instant Withdrawal For New Crypto Poker Players

BINGHAMTON, NY, Feb. 10, 2026 (GLOBE NEWSWIRE) --  The bitcoin casino no deposit bonus landscape has entered a new era as crypto gaming platforms race to attract players with increasingly generous risk-free offers. BC Poker, launched in 2026 by the BC.GAME Group, has emerged at the forefront of this trend...

Read moreDetails

Bringing Pets to Life: PetLive Introduces AI Digital Frame for Emotional Companionship

Chicago, Illinois, Feb. 10, 2026 (GLOBE NEWSWIRE) -- Amid the accelerating convergence of pet technology and smart home devices, PetLive's AI-powered digital pet frame is drawing increasing attention. Unlike traditional digital frames that simply rotate through static images, this product combines generative AI with a pet-centric content system to offer...

Read moreDetails

Silicon Valley Acquisition Corp. Announces the Separate Trading of Its Class A Ordinary Shares and Warrants, Commencing on February 12, 2026

NEW YORK, Feb. 10, 2026 (GLOBE NEWSWIRE) -- Silicon Valley Acquisition Corp. (Nasdaq: SVAQU) (the “Company”) today announced that, commencing on February 12, 2026, holders of the units (the “Units”) sold in the Company’s initial public offering may elect to separately trade the Company’s Class A ordinary shares (the “Ordinary...

Read moreDetails

APCON’s Network Security Appliance Combines Network Visibility, Packet Capture, and Users’ Preferred Security Applications

IntellaStore® IV, APCON's new network security appliance, offers the on‑box APCON Intelligent Processor (AIp) to run the user's choice of security applications including APCON's own ThreatGuard WILSONVILLE, OREGON / ACCESS Newswire / February 10, 2026 / Deploying the IntellaStore® IV Network Security Appliance from APCON means easy installation, dedicated network...

Read moreDetails

Boosting Engagement with Image-to-Video AI Content

Let's be honest for a second: the social media feed is a battlefield. You spend hours editing the perfect photo, finding the right lighting, and nailing the composition. You post it, and... crickets. Maybe a few likes from your friends, but it doesn't move the needle.It's not because your content...

Read moreDetails

Professionals Share Key Warning Signs Bristol AC Systems Need Repair, VA

Image: https://www.abnewswire.com/upload/2026/02/8b99f850b361177e5cc40293e1b09faf.jpgSummer in the Appalachian Highlands brings a distinct mix of warmth and humidity that can make a functioning air conditioning system an absolute necessity for homeowners. In Bristol, VA, where temperatures can climb steadily during the peak months, the comfort of your indoor environment relies heavily on the efficiency...

Read moreDetails

Professionals Share Key Warning Signs Bristol AC Systems Need Repair, VA

Image: https://www.abnewswire.com/upload/2026/02/8b99f850b361177e5cc40293e1b09faf.jpgSummer in the Appalachian Highlands brings a distinct mix of warmth and humidity that can make a functioning air conditioning system an absolute necessity for homeowners. In Bristol, VA, where temperatures can climb steadily during the peak months, the comfort of your indoor environment relies heavily on the efficiency...

Read moreDetails

Clarksville Homeowners Advised Address AC Issues Before Costly Breakdowns,

Image: https://www.abnewswire.com/upload/2026/02/ff52fe420d5e2d708842a4388e1c71c1.jpgThe summers in Tennessee are known for being long, hot, and oppressively humid. For homeowners in Clarksville, a functioning air conditioning system is not a luxury; it is a necessity for health and comfort. When the heat index climbs, your cooling unit runs almost continuously to maintain a livable...

Read moreDetails

Clarksville Homeowners Advised Address AC Issues Before Costly Breakdowns,

Image: https://www.abnewswire.com/upload/2026/02/ff52fe420d5e2d708842a4388e1c71c1.jpgThe summers in Tennessee are known for being long, hot, and oppressively humid. For homeowners in Clarksville, a functioning air conditioning system is not a luxury; it is a necessity for health and comfort. When the heat index climbs, your cooling unit runs almost continuously to maintain a livable...

Read moreDetails
Web3Wire NFTs - The Web3 Collective

Web3Wire, $W3W Token and .w3w tld Whitepaper

Web3Wire, $W3W Token and .w3w tld Whitepaper

Claim your space in Web3 with .w3w Domain!

Web3Wire

Trending on Web3Wire

  • Quantum Chip Market Boom in Size and Share Redefines Processing | Rigetti Computing • D-Wave Systems • IonQ • Microsoft

    6 shares
    Share 2 Tweet 2
  • Carbon Removal Credit (CRC) Launches Carbon Asset NFT Framework: Giving Every Tonne of Carbon a Digital Identity

    6 shares
    Share 2 Tweet 2
  • Unifying Blockchain Ecosystems: 2024 Guide to Cross-Chain Interoperability

    150 shares
    Share 60 Tweet 38
  • Top Cross-Chain DeFi Solutions to Watch by 2025

    79 shares
    Share 32 Tweet 20
  • Discover 2025’s Top 5 Promising Low-Cap Crypto Gems

    90 shares
    Share 36 Tweet 23
Join our Web3Wire Community!

Our newsletters are only twice a month, reaching around 10000+ Blockchain Companies, 800 Web3 VCs, 600 Blockchain Journalists and Media Houses.


* We wont pass your details on to anyone else and we hate spam as much as you do. By clicking the signup button you agree to our Terms of Use and Privacy Policy.

Web3Wire Podcasts

Upcoming Events

There are currently no events.

Latest on Web3Wire

  • HJC Exchange Completes Platform Technology Upgrade to Enhance System Performance and Security
  • Hatch selected by Maaden as partner to accelerate mining development in Saudi Arabia
  • Bitcoin Casino No Deposit Bonus: BC Poker Launches $5 Free Bonus With Instant Withdrawal For New Crypto Poker Players
  • Bringing Pets to Life: PetLive Introduces AI Digital Frame for Emotional Companionship
  • Silicon Valley Acquisition Corp. Announces the Separate Trading of Its Class A Ordinary Shares and Warrants, Commencing on February 12, 2026

RSS Latest on Block3Wire

  • Covo Finance: Revolutionary Crypto Leverage Trading Platform
  • WorldStrides and HEX Announce Partnership to Offer High School and University Students Innovative Courses Designed to Improve Their Outlook in the Digital Age
  • Cathedra Bitcoin Announces Leasing of 2.5-MW Bitcoin Mining Facility
  • Global Web3 Payments Leader, Banxa, Announces Integration With Metis to Usher In Next Wave of Cryptocurrency Users
  • Dexalot Launches First Hybrid DeFi Subnet on Avalanche

RSS Latest on Meta3Wire

  • Thumbtack Honored as a 2023 Transform Awards Winner
  • Accenture Invests in Looking Glass to Accelerate Shift from 2D to 3D
  • MetatronAI.com Unveils Revolutionary AI-Chat Features and Interface Upgrades
  • Purely.website – Disruptive new platform combats rising web hosting costs
  • WEMADE and Metagravity Sign Strategic Alliance MOU to Collaborate on Blockchain Games for the Metaverse
Web3Wire

Web3Wire is your go-to source for the latest insights and updates in Web3, Metaverse, Blockchain, AI, Cryptocurrencies, DeFi, NFTs, and Gaming. We provide comprehensive coverage through news, press releases, event updates, and research articles, keeping you informed about the rapidly evolving digital world.

  • About Web3Wire
  • Web3Wire NFTs – The Web3 Collective
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Event Partners
  • Community Partners
  • Our Media Network
  • Media Kit
  • RSS Feeds
  • Contact Us

Whitepaper | Tokenomics

Crypto Coins

  • Top 10 Coins
  • Top 50 Coins
  • Top 100 Coins
  • All Coins – Marketcap
  • Crypto Coins Heatmap

Crypto Exchanges

  • Top 10 Exchanges
  • Top 50 Exchanges
  • Top 100 Exchanges
  • All Crypto Exchanges

Crypto Stocks

  • Blockchain Stocks
  • NFT Stocks
  • Metaverse Stocks
  • Artificial Intelligence Stocks

Media Portfolio: Block3Wire | Meta3Wire

Web3 Resources

  • Top Web3 and Crypto Youtube Channels
  • Latest Crypto News
  • Latest DeFi News
  • Latest Web3 News

Blockchain Resources

  • Blockchain and Web3 Resources
  • Decentralized Finance (DeFi) – Research Reports
  • All Crypto Whitepapers

Metaverse Resources

  • AR VR and Metaverse Resources
  • Metaverse Courses
Claim your space in Web3 with .w3w!
Top 50 Web3 Blogs and Websites
Web3Wire Podcast on Spotify Web3Wire Podcast on Amazon Music 
Web3Wire - Web3 and Blockchain - News, Events and Press Releases | Product Hunt
Web3Wire on Google News
  • Privacy Policy
  • Terms of Use
  • Disclaimer
  • Sitemap
  • For Search Engines
  • Crypto Sitemap
  • Exchanges Sitemap

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Coins
    • Top 10 Cryptocurrencies
    • Top 50 Cryptocurrencies
    • Top 100 Cryptocurrencies
    • All Coins
  • Exchanges
    • Top 10 Cryptocurrency Exchanges
    • Top 50 Cryptocurrency Exchanges
    • Top 100 Cryptocurrency Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.