mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#deceptivedevelopment

0 posts0 participants0 posts today
Pyrzout :vm:<p>Freelance Software Developers in North Korean Malware Crosshairs – Source: www.securityweek.com <a href="https://ciso2ciso.com/freelance-software-developers-in-north-korean-malware-crosshairs-source-www-securityweek-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/freelance-softwa</span><span class="invisible">re-developers-in-north-korean-malware-crosshairs-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/DeceptiveDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeceptiveDevelopment</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/fakeITworkers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fakeITworkers</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> <a href="https://social.skynetcloud.site/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinkedIn</span></a> <a href="https://social.skynetcloud.site/tags/AnyDesk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnyDesk</span></a> <a href="https://social.skynetcloud.site/tags/eset" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eset</span></a></p>
Pyrzout :vm:<p>Freelance Software Developers in North Korean Malware Crosshairs <a href="https://www.securityweek.com/freelance-software-developers-in-north-korean-malware-crosshairs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/freelance-sof</span><span class="invisible">tware-developers-in-north-korean-malware-crosshairs/</span></a> <a href="https://social.skynetcloud.site/tags/DeceptiveDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeceptiveDevelopment</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/fakeITworkers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fakeITworkers</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> <a href="https://social.skynetcloud.site/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinkedIn</span></a> <a href="https://social.skynetcloud.site/tags/AnyDesk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnyDesk</span></a> <a href="https://social.skynetcloud.site/tags/ESET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESET</span></a></p>
Pyrzout :vm:<p>Freelance Software Developers in North Korean Malware Crosshairs <a href="https://www.securityweek.com/freelance-software-developers-in-north-korean-malware-crosshairs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/freelance-sof</span><span class="invisible">tware-developers-in-north-korean-malware-crosshairs/</span></a> <a href="https://social.skynetcloud.site/tags/DeceptiveDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeceptiveDevelopment</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/fakeITworkers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fakeITworkers</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> <a href="https://social.skynetcloud.site/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinkedIn</span></a> <a href="https://social.skynetcloud.site/tags/AnyDesk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnyDesk</span></a> <a href="https://social.skynetcloud.site/tags/ESET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESET</span></a></p>
ESET Research<p><a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETresearch</span></a> analyzed a campaign by <a href="https://infosec.exchange/tags/DeceptiveDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeceptiveDevelopment</span></a> targeting developers with trojanized coding tests. Posing as recruiters, the operators approach their targets on job-hunting platforms, aiming to steal their cryptocurrency wallets and more.</p><p><a href="https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/deceptivedevelopment-targets-freelance-developers/</span></a></p><p>DeceptiveDevelopment is a 🇰🇵-aligned activity cluster. The attackers target software developers on 🪟 Windows, 🐧Linux, and 🍎 macOS, regardless of geographical location, in order to maximize profits. </p><p>The campaign primarily uses two malware families – the first, 🦫 BeaverTail, acts as a simple login stealer, extracting browser databases containing saved logins, and is a downloader for the second stage, InvisibleFerret.</p><p>InvisibleFerret is modular 🐍 Python-based malware that includes spyware and backdoor components, and is also capable of downloading the legitimate AnyDesk remote management and monitoring software for post-compromise activities.</p><p>While DeceptiveDevelopment’s toolset has already been analyzed by <a href="https://x.com/Unit42_Intel" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">x.com/Unit42_Intel</span><span class="invisible"></span></a> and <a href="https://x.com/GroupIB_TI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">x.com/GroupIB_TI</span><span class="invisible"></span></a>, our analysis contains details that have not been publicly reported before.</p><p>You can find the IoCs in our GitHub repo: <br><a href="https://github.com/eset/malware-ioc/tree/master/deceptivedevelopment" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/eset/malware-ioc/tr</span><span class="invisible">ee/master/deceptivedevelopment</span></a></p>