More Hacking attacks on Developers

More Hacking attacks on Developers

A new campaign tracked as “Dev Popper” is a sophisticated, multi-stage infection chain based on social engineering. Attackers target software developers with fake job interviews in an attempt to trick them into installing a Python remote access trojan.

The target developers are asked to perform tasks supposedly related to the interview by downloading and running code for the interview. The code is infected with obfuscated code/packages that downloads additional binaries that complete the infection. The threat actor’s goal is make their targets download malicious software that gathers system information and enables remote access to the host.

According to Securonix analys of Dev Popper, the campaign is likely orchestrated by North Korean threat actors based on the observed tactics. The connections are not strong enough for attribution, though.

Articles:

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.