Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article
These particular attacks from North Korean state-funded hacking team Lazarus Group are new, but the overall malware campaign against the Python development community has been running since at least August of 2023, when a number of popular open source Python tools were maliciously duplicated with added malware. Now, though, there are also attacks involving “coding tests” that only exist to get the end user to install hidden malware on their system (cleverly hidden with Base64 encoding) that allows remote execution once present. The capacity for exploitation at that point is pretty much unlimited, due to the flexibility of Python and how it interacts with the underlying OS.
More Stories
US Blocks Foreign Governments from Acquiring Citizen Data
The US government has implemented a program that applies export controls on data transactions to certain countries of concern, including...
China Sort of Admits to Being Behind Volt Typhoon
The Wall Street Journal has the story: Chinese officials acknowledged in a secret December meeting that Beijing was behind a...
Digital Certificate Lifespans to Fall to 47 Days by 2029
CA/Browser Forum members have voted in favor of shortening TLS/SSL certificate lifespans to 47 days Read More
AI Hallucinations Create “Slopsquatting” Supply Chain Threat
Experts have warned that threat actors could hijack AI hallucinations in “slopsquatting” attacks Read More
Medusa ransomware gang claims to have hacked NASCAR
Read more in my article on the Hot for Security blog. Read More
NVD Revamps Operations as Vulnerability Reporting Surges
The NVD program manager has announced undergoing process improvements to catch up with its growing vulnerability backlog Read More