The DEV#POPPER campaign continues to evolve, with North Korean threat actors now deploying malware that targets developers across Linux, Windows, and macOS platforms. The Securonix Threat Research team has identified new, more robust malware variants linked to this campaign, which remains focused on social engineering tactics to compromise industry professionals.
Despite no specific trend in victimology, the campaign’s impact is widespread, affecting individuals in South Korea, North America, Europe, and the Middle East. The adversaries’ advanced techniques exploit human vulnerabilities, leveraging psychological manipulation to deceive victims into compromising sensitive information or their organizations.
Cybercriminals are using the confidence of being interviewers to get programmers to download a zip file (onlinestoreforhirog.zip). Inside the zip file is a package that is executed with “npm install” and “npm start”, after executing it the cybercriminal has access to the victim’s computer.
The JavaScript code utilized in the DEV#POPPER campaign is heavily obfuscated, employing multiple techniques to conceal its true functionality. These methods include:
These obfuscation techniques create significant challenges for analysts trying to understand the malware’s behavior, highlighting the sophistication of the DEV#POPPER campaign.
A function prepares a form data object containing system information and other collected data, which is then sent to the command-and-control (C2) server. This process involves:
We recommend that we always be cautious about what we run on our computers. We must have a culture of cybersecurity where we are always on alert for any irregularity as in the case of DEV#POPPER where we were told to run a code without knowing its precedence. That is why cybersecurity awareness is very important not only for work, but also for our daily lives, here at Piscium we encourage and train people to reduce the risks of social engineering.
Alerts About a New Phishing Attack Using Corrupted Files The cybersecurity landscape is constantly evolving,…
What is cybersecurity? Cybersecurity is the practice of protecting systems, networks, applications and data from…
A Comprehensive Guide On Access Control Models Access control models are essential for maintaining the…
What is the KISS Principle The KISS (keep it simple, stupid or keep it stxpid…
What is the Software Development Life Cycle (SDLC)? The Software Development Life Cycle (SDLC) is…
State of the Info Stealers Info stealers are a type of Trojan that reside on…