Cybersecurity experts from Cisco Talos have released a disturbing report: a North Korean-linked hacker group, dubbed “Famous Chollima,” is running sophisticated phishing campaigns targeting people looking for cryptocurrency jobs in India. The main goal is to steal personal information, financial data, and access personal cryptocurrency wallets, using tactics that impersonate recruiters. While the group’s links to the infamous Lazarus group have not been confirmed, the group’s campaign represents a broadening of North Korea’s targeted cyberattacks.
Method of Attack: From Fake Companies to Phishing Skills Tests
Unlike traditional hacks, Famous Chollima’s campaign did not directly attack the systems of major cryptocurrency companies. Instead, the group targeted individuals specifically looking for jobs in the blockchain and digital assets space. The hackers created fake recruitment websites that mimicked well-known companies in the industry, such as Kraken, Robinhood, or Web3 startups.
After attracting candidates, the group conducted fake video interviews. During this process, they asked candidates to perform “digital” skills tests, including copying and pasting commands into a terminal or Command Prompt. However, these commands were actually malware designed to install the PylangGhost spyware.
The malware’s goal: Access cryptocurrency wallets and sensitive data
Once the malware was successfully installed, the user’s system would be completely taken over. The PylangGhost malware is designed to collect login data, browser history, and access cryptocurrency wallets through more than 80 popular extensions such as MetaMask, Phantom, Trust Wallet, and 1Password.
Attackers could use this data to steal cryptocurrency, or launch follow-up attacks on companies where candidates are applying. This raises the question of whether the campaign is intended to be more than just a simple theft, but rather a prelude to larger-scale attacks on cryptocurrency ecosystems.
Layered Attack Pattern: Signs of Coordination Within North Korean Hackers
According to security experts, this could be part of a layered attack strategy used by North Korean hacker groups. Groups like Lazarus have been known to use a low-skilled team to conduct the initial intrusion, then hand it off to a team of experts to carry out more complex thefts. Famous Chollima’s approach of collecting personal information through employment scenarios may be a way to build cover for deeper intrusions into the systems of global cryptocurrency companies.
Warning signs and security tips for users
Cisco Talos recommends that users be especially cautious of unsolicited job offers, especially in the burgeoning Web3 space. Here are some essential security measures to take:
Never run command lines or install software following instructions from unverified sources.
Use multi-factor authentication (MFA) for important accounts and wallets.
Monitor browser extensions and avoid storing passwords or wallet keys on unsecured apps.
Verify the legitimacy of the hiring company and interview platform before providing any personal information.
Install reliable antivirus and endpoint security software to monitor for unusual activity.
Conclusion: Vulnerabilities in the Cryptocurrency Talent Supply Chain
The attack on job seekers reflects an increasingly sophisticated threat in the crypto industry. As organizations tighten their internal security, groups like Famous Chollima are turning to exploiting individuals who are the most vulnerable links in the security chain.
The blockchain industry needs to increase awareness and security training for its employees, especially in the context of increasingly global hiring. Individuals, especially those working remotely or freelance in the crypto industry, need to be proactive in protecting themselves against increasingly sophisticated scams.
If not careful, a seemingly innocuous command line could be the first step in a large-scale theft of digital assets.