Fireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target cryptoFireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target crypto

Fireblocks Exposes Sophisticated Lazarus-Linked Hiring Scam

2026/01/23 15:04
4분 읽기

Fireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target crypto developers with malware. The investigation, published on January 22, 2026, revealed that attackers linked to the Lazarus Group leveraged fake recruitment processes to compromise victims’ systems and steal sensitive digital asset credentials.

The operation, internally labeled Operation Contagious Interview by Fireblocks’ security team, demonstrated a high level of sophistication. Attackers posed as legitimate Fireblocks recruiters on LinkedIn and used realistic hiring workflows to establish credibility before delivering malicious payloads disguised as routine coding tasks.

Impersonation Tactics and Social Engineering

According to the findings, the attackers created multiple convincing LinkedIn profiles that appeared to belong to Fireblocks executives, recruiters, and hiring managers. These profiles included professional photographs, detailed employment histories, and network connections aligned with blockchain and technical roles. Unlike many phishing attempts, the campaign avoided obvious warning signs such as spelling mistakes or poor formatting.

Once developers engaged with these profiles, they were sent professionally designed PDF documents outlining a fictitious initiative referred to as the Fireblocks Poker Platform. To further reinforce authenticity, the attackers built detailed design mockups using tools such as Figma. The materials closely mirrored Fireblocks’ real branding and referenced the company’s recent acquisition of Dynamic, which had been announced only weeks earlier. This level of accuracy indicated that the attackers were actively monitoring Fireblocks’ public announcements.

Fake Interviews and Malware Delivery

The scam extended beyond written communication into live interaction. Victims were invited to video interviews conducted over Google Meet, where the impostors followed standard hiring practices by asking about work experience and compensation expectations. After establishing rapport, the interviewers assigned what was presented as a code review or technical assessment and abruptly ended the call, citing scheduling constraints.

The malicious stage of the attack occurred when candidates followed standard developer workflows. Victims were instructed to clone a GitHub repository and run npm install, a common setup step. Executing this command triggered hidden malicious code, granting attackers access to the victim’s system. The malware infrastructure also employed a technique known as EtherHiding, which uses blockchain smart contracts to host command-and-control instructions, making the operation more resilient to takedowns.

Attribution to the Lazarus Group

Fireblocks’ security research team attributed the campaign to APT 38, a subgroup of the Lazarus Group known for financially motivated cyber operations. The investigation identified similarities with earlier attacks, including a previous recruitment scam that impersonated Multibank Group and used a comparable fake poker platform as bait.

The primary objective of the operation was financial theft. By compromising developers’ machines, the attackers sought to steal credentials, private keys, seed phrases, and access to development environments. Because developers often have elevated access to production systems and sensitive repositories, successful infections could provide attackers with entry points into entire organizations.

Indicators and Campaign Disruption

Fireblocks identified at least twelve fake personas used during the campaign. Indicators of compromise included the use of personal email addresses instead of corporate domains, Calendly links hosted on non-corporate sites, AI-generated profile descriptions, and LinkedIn accounts with little historical activity that suddenly became active.

The campaign began to unravel when several job seekers contacted Fireblocks employees directly to ask about the supposed poker platform project. These inquiries were escalated internally, allowing the security team to confirm the impersonation. Fireblocks then worked with LinkedIn to report and remove fraudulent profiles and coordinated the takedown of malicious repositories.

Guidance for the Crypto Community

Fireblocks has stated that it coordinated with intelligence partners and law enforcement to reduce the risk of follow-on attacks. The company, which reports securing more than $10 trillion in digital asset transfers across hundreds of millions of wallets, emphasized the importance of vigilance during recruitment processes.

Job seekers in the crypto sector are advised to verify recruiter outreach against official company career pages and ensure that communications originate from verified corporate email addresses. Fireblocks also noted that being asked to clone repositories and run installation commands as part of an interview process should be treated with caution, even when the overall interaction appears legitimate.

The post Fireblocks Exposes Sophisticated Lazarus-Linked Hiring Scam appeared first on CoinTrust.

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

추천 콘텐츠

Strategy Issues Preferred Stock to Steady Bitcoin Bet

Strategy Issues Preferred Stock to Steady Bitcoin Bet

Strategy is increasing its program of preferred stocks to buy more Bitcoins as it seeks to reduce the impact of market volatility. The company wants to continue
공유하기
Thenewscrypto2026/02/12 17:55
Today’s NYT Pips Hints And Solutions For Thursday, September 18th

Today’s NYT Pips Hints And Solutions For Thursday, September 18th

The post Today’s NYT Pips Hints And Solutions For Thursday, September 18th appeared on BitcoinEthereumNews.com. It’s Thursday and I am incredibly sore and tired after really hitting the weights and the yoga mat hard this week. Sore is good! It takes pain to reduce pain, or at least that’s my experience with exercise. We must exercise our minds as well, and what better way to do that than with a fun puzzle game about placing dominoes in the correct tiles. Come along, my Pipsqueaks, let’s solve today’s Pips! Looking for Wednesday’s Pips? Read our guide right here. How To Play Pips In Pips, you have a grid of multicolored boxes. Each colored area represents a different “condition” that you have to achieve. You have a select number of dominoes that you have to spend filling in the grid. You must use every domino and achieve every condition properly to win. There are Easy, Medium and Difficult tiers. Here’s an example of a difficult tier Pips: Pips example Screenshot: Erik Kain As you can see, the grid has a bunch of symbols and numbers with each color. On the far left, the three purple squares must not equal one another (hence the equal sign crossed out). The two pink squares next to that must equal a total of 0. The zig-zagging blue squares all must equal one another. You click on dominoes to rotate them, and will need to since they have to be rotated to fit where they belong. Not shown on this grid are other conditions, such as “less than” or “greater than.” If there are multiple tiles with > or < signs, the total of those tiles must be greater or less than the listed number. It varies by grid. Blank spaces can have anything. The various possible conditions are: = All pips must equal one another in this group. ≠ All pips…
공유하기
BitcoinEthereumNews2025/09/18 08:59
Vivex Announces New Peer-Reviewed Publication Demonstrating Long-Term Fusion Outcomes with VIA Form+™ in Lumbar Interbody Fusion

Vivex Announces New Peer-Reviewed Publication Demonstrating Long-Term Fusion Outcomes with VIA Form+™ in Lumbar Interbody Fusion

MIAMI, Feb. 12, 2026 /PRNewswire/ — Vivex Biologics, Inc., a leading medical technology company developing and delivering innovative allografts for musculoskeletal
공유하기
AI Journal2026/02/12 21:32