Lazarus Group Targets Crypto Wallets with Cross-Platform JavaScript Malware

February 06, 2025 03:27 AM AEDT | By Team Kalkine Media
 Lazarus Group Targets Crypto Wallets with Cross-Platform JavaScript Malware
Image source: Shutterstock

Highlights

  • Lazarus Group uses fake job offers A new campaign involves fraudulent LinkedIn messages in the cryptocurrency and travel sectors.
  • Malware infects multiple operating systems The attack deploys a JavaScript-based stealer that targets Windows, macOS, and Linux.
  • Payloads retrieve sensitive data The malware steals information from crypto wallet extensions and establishes persistent access.

A newly identified cyber threat campaign attributed to the North Korea-linked Lazarus Group has been found using deceptive job offers to distribute malware targeting cryptocurrency wallets. The campaign, identified by cybersecurity firm Bitdefender, involves fake job opportunities shared through professional networking platforms.

The attack begins with a fraudulent LinkedIn message that promotes remote work opportunities in the cryptocurrency and travel industries. These messages appear to originate from recruiters offering attractive positions, such as flexible work arrangements and high compensation. The primary objective of these messages is to gain trust and extract personal details from the targeted individuals.

Once the targeted user provides initial information, the attackers escalate the scheme by sending a link to a GitHub or Bitbucket repository. The repository contains a purported minimum viable product (MVP) of a decentralized exchange (DEX) project. The target is encouraged to review the project and provide feedback, but the code contains embedded malware.

Malware Deployment and Technical Execution

The malicious repository includes an obfuscated JavaScript file designed to retrieve a secondary payload from an external source. The payload functions as a cross-platform information stealer capable of harvesting data from various cryptocurrency wallet extensions installed in the victim’s browser.

Beyond extracting wallet credentials, the JavaScript-based malware also serves as a loader for a Python-based backdoor. The backdoor grants persistent remote access to the attackers and enables them to monitor clipboard activity. This function is particularly concerning for cryptocurrency users, as clipboard monitoring can be used to intercept and modify wallet addresses during transactions.

The malware escalates further by deploying a .NET-based binary, which downloads and executes a TOR proxy server. The proxy server facilitates covert communication with a command-and-control (C2) infrastructure, allowing the attackers to exfiltrate system information, execute additional payloads, and monitor keystrokes.

Impact on Cryptocurrency Users and Digital Security

The primary targets of this campaign are individuals and organizations involved in cryptocurrency trading and development. By using fake job recruitment strategies, the attackers can deceive professionals into engaging with malicious content without immediate suspicion. The malware’s capability to operate across Windows, macOS, and Linux systems increases its potential reach and effectiveness.

Cryptocurrency users rely on browser extensions for wallet management, making them a lucrative target for attackers. If the malware successfully retrieves credentials or private keys, it can result in unauthorized access to digital assets. The inclusion of a cryptocurrency mining component further indicates that the attackers aim to maximize financial gain through multiple methods.

Broader Cybersecurity Concerns

The Lazarus Group has been linked to various cyber espionage and financial theft campaigns, often leveraging social engineering tactics. This latest campaign demonstrates a refined approach that integrates professional networking platforms and open-source repositories to distribute malware.

The use of JavaScript and Python-based components allows the attackers to maintain flexibility and execute their campaign across different environments. The ability to bypass traditional security measures further complicates detection, highlighting the need for stronger cybersecurity protocols within the cryptocurrency sector.

Protective Measures and Risk Mitigation

Cybersecurity experts recommend several measures to mitigate the risks associated with this type of attack. Individuals and organizations operating in the cryptocurrency industry should exercise caution when receiving unsolicited job offers or project invitations through professional networking sites. Verifying the authenticity of recruitment messages and avoiding interactions with unknown repositories can help prevent malware infections.

Security teams should implement advanced endpoint protection tools that detect and block JavaScript-based malware. Additionally, monitoring for unusual clipboard activity can help identify potential threats early. For organizations handling cryptocurrency transactions, using hardware wallets and multi-factor authentication provides an extra layer of security against unauthorized access.

The latest campaign by the Lazarus Group underscores the evolving threats within the cryptocurrency space. By combining social engineering with cross-platform malware deployment, the attackers have developed a sophisticated strategy to target individuals involved in digital asset management. As cybersecurity threats continue to evolve, awareness and proactive security measures remain essential in safeguarding sensitive financial information and digital infrastructure.

 


Disclaimer

The content, including but not limited to any articles, news, quotes, information, data, text, reports, ratings, opinions, images, photos, graphics, graphs, charts, animations and video (Content) is a service of Kalkine Media Pty Ltd (Kalkine Media, we or us), ACN 629 651 672 and is available for personal and non-commercial use only. The principal purpose of the Content is to educate and inform. The Content does not contain or imply any recommendation or opinion intended to influence your financial decisions and must not be relied upon by you as such. Some of the Content on this website may be sponsored/non-sponsored, as applicable, but is NOT a solicitation or recommendation to buy, sell or hold the stocks of the company(s) or engage in any investment activity under discussion. Kalkine Media is neither licensed nor qualified to provide investment advice through this platform. Users should make their own enquiries about any investments and Kalkine Media strongly suggests the users to seek advice from a financial adviser, stockbroker or other professional (including taxation and legal advice), as necessary. Kalkine Media hereby disclaims any and all the liabilities to any user for any direct, indirect, implied, punitive, special, incidental or other consequential damages arising from any use of the Content on this website, which is provided without warranties. The views expressed in the Content by the guests, if any, are their own and do not necessarily represent the views or opinions of Kalkine Media. Some of the images/music that may be used on this website are copyright to their respective owner(s). Kalkine Media does not claim ownership of any of the pictures displayed/music used on this website unless stated otherwise. The images/music that may be used on this website are taken from various sources on the internet, including paid subscriptions or are believed to be in public domain. We have used reasonable efforts to accredit the source wherever it was indicated as or found to be necessary.


AU_advertise

Advertise your brand on Kalkine Media

Sponsored Articles


Investing Ideas

Previous Next
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.