North Korea’s notorious Lazarus Group has launched a new cyber-espionage campaign targeting blockchain developers. Security researchers recently uncovered that Lazarus operatives created two fake U.S. firms — BlockNovas LLC in New Mexico and SoftGlide LLC in New York — under stolen identities. These shell companies posted bogus crypto-related job openings on LinkedIn, Upwork and other platforms to lure developers into malware-laced “technical interviews.” When applicants downloaded the so-called coding tests, they unwittingly installed hidden malware designed to steal browser data, cryptocurrency wallet keys, and login credentials from their machines01.
Who is North Korea’s Lazarus Group?
The Lazarus Group is an elite state-sponsored hacker collective tied to North Korea’s military intelligence. It has been blamed for some of the largest cryptocurrency heists ever, including the $600 million Ronin Network hack and the $1.4 billion Bybit theft2. Funded by illicit cybercrime, Lazarus uses sophisticated tactics to evade sanctions and funnel money back to Pyongyang’s weapons programs. In this latest scheme, the group’s Reconnaissance General Bureau operatives managed to register legal U.S. LLCs — a highly unusual move that adds a veneer of legitimacy to their attacks34.
Fake U.S. Companies: BlockNovas & SoftGlide
Lazarus set up BlockNovas LLC (registered in New Mexico) and SoftGlide LLC (registered in New York) using completely fake identities and addresses. Investigators noted that BlockNovas listed a vacant lot in South Carolina as its address, and SoftGlide’s address traces to a small tax office in Buffalo5. The hackers even built professional-looking websites and job profiles for these fronts. These sham companies posed as crypto consulting firms hiring blockchain developers, in blatant violation of U.S. Treasury and UN sanctions on North Korea6. By appearing as legitimate employers, the scheme aimed to build trust and lower the guard of their targets.
Scam Tactics & Malware
Victims reported that the fake companies contacted them with personalized interview invites. During a video interview, an error message would prompt the candidate to “click and paste” a command to fix the issue7. This seemingly harmless step actually installed malware on the developer’s computer. Researchers have identified at least three malicious software strains in this campaign:
- BeaverTail: A Trojan designed to harvest information and load additional malware8.
- InvisibleFerret and OtterCookie: Tools focused on capturing sensitive data like crypto wallet private keys and clipboard contents9.
To make the ruse more convincing, Lazarus operatives created fake employee profiles using AI-generated headshots and even stole real photos of people to populate the companies’ websites and social media1011. These sophisticated details make the scam fronts appear authentic at first glance, making it all the more dangerous for unsuspecting developers.
Impact on Crypto Developers
Hundreds of blockchain and web3 developers were targeted through these fake job offers12. Those who engaged risked having their cryptocurrency wallets emptied and accounts compromised. In one reported incident, a developer’s MetaMask wallet was accessed and funds stolen after completing a bogus coding test13. Cybersecurity firm Silent Push confirmed multiple victims associated with the BlockNovas front14.
Law enforcement quickly responded to the campaign. The FBI has seized the domain for BlockNovas LLC as part of an active effort against these North Korean cyber actors, though the SoftGlide infrastructure remains live for now1516. U.S. officials warn that North Korea’s hacking operations are among the most advanced threats facing the nation17. The scheme also represents a clear breach of international sanctions, since establishing a North Korean-controlled company on U.S. soil is expressly forbidden18.
This incident highlights how closely cybercrime is tied to geopolitics. Analysts estimate that the proceeds from such crypto thefts are funneled into North Korea’s nuclear and missile programs1920. By targeting the crypto talent pool directly, Lazarus has raised the stakes for the entire blockchain industry.
Protecting Yourself from Developer Hacks
- Verify Companies: Always research a company’s background before applying. Check official registration records and be wary of obscure addresses or inconsistencies.
- Scrutinize Interview Requests: Genuine technical tests should never ask you to paste unknown code or bypass security warnings. If an interview task seems odd, double-check with the recruiter via a known channel.
- Separate Work & Wallets: Use dedicated hardware wallets or devices for storing cryptocurrency keys. Never keep large amounts of crypto on the same computer used for everyday development.
- Use Security Best Practices: Keep your operating system and software up-to-date, use reputable antivirus or anti-malware tools, and enable two-factor authentication on all important accounts.
- Report Suspicious Activity: If you encounter a questionable job post or site, notify the platform (e.g. LinkedIn, Upwork) and consider reporting it to authorities. Sharing warnings in developer communities helps protect others.
In summary, the Lazarus Group’s use of fake U.S. companies is a reminder that blockchain developers can be targets just like large exchanges. As nation-state hackers become more sophisticated, the crypto industry must remain vigilant. Always verify recruitment channels, scrutinize technical tests, and safeguard your wallet keys to stay one step ahead of such threats.
Follow DecentraZone for more crypto security news and updates!
0 Comments