ESET Research<p><a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETresearch</span></a> analyzed a campaign by <a href="https://infosec.exchange/tags/DeceptiveDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeceptiveDevelopment</span></a> targeting developers with trojanized coding tests. Posing as recruiters, the operators approach their targets on job-hunting platforms, aiming to steal their cryptocurrency wallets and more.</p><p><a href="https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/deceptivedevelopment-targets-freelance-developers/</span></a></p><p>DeceptiveDevelopment is a 🇰🇵-aligned activity cluster. The attackers target software developers on 🪟 Windows, 🐧Linux, and 🍎 macOS, regardless of geographical location, in order to maximize profits. </p><p>The campaign primarily uses two malware families – the first, 🦫 BeaverTail, acts as a simple login stealer, extracting browser databases containing saved logins, and is a downloader for the second stage, InvisibleFerret.</p><p>InvisibleFerret is modular 🐍 Python-based malware that includes spyware and backdoor components, and is also capable of downloading the legitimate AnyDesk remote management and monitoring software for post-compromise activities.</p><p>While DeceptiveDevelopment’s toolset has already been analyzed by <a href="https://x.com/Unit42_Intel" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">x.com/Unit42_Intel</span><span class="invisible"></span></a> and <a href="https://x.com/GroupIB_TI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">x.com/GroupIB_TI</span><span class="invisible"></span></a>, our analysis contains details that have not been publicly reported before.</p><p>You can find the IoCs in our GitHub repo: <br><a href="https://github.com/eset/malware-ioc/tree/master/deceptivedevelopment" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/eset/malware-ioc/tr</span><span class="invisible">ee/master/deceptivedevelopment</span></a></p>