Categories: Cyber Security News

ClickFake Interview – Lazarus Hackers Exploit Windows and macOS Users Fake Job Campaign

The Lazarus Group, a North Korean state-sponsored hacking collective, has launched a new campaign dubbed ClickFake Interview, targeting job seekers in the cryptocurrency industry.

This malicious operation uses fake job interview websites to deploy a Go-based backdoor, known as GolangGhost, on both Windows and macOS systems.

The campaign represents an evolution of the previously documented Contagious Interview campaign, showcasing Lazarus’ adaptability and persistent focus on exploiting the cryptocurrency ecosystem.

Lazarus has been active since at least 2009, conducting cyber espionage and financial operations to support North Korea’s missile and nuclear programs.

Since 2017, the group has increasingly targeted cryptocurrency entities, leveraging malware, supply chain attacks, trojanized applications, and fake job offers.

Clickfake interview – lazarus hackers exploit windows and macos users fake job campaign 3

In March 2025, Lazarus executed the largest crypto heist in history, stealing $1.5 billion from Bybit, a UAE-based exchange—an attack that highlights its growing sophistication.

ClickFake Interview Campaign

The ClickFake Interview campaign builds upon the tactics of Contagious Interview, which targeted software developers via fake job interviews conducted on platforms like LinkedIn or X (formerly Twitter).

In this new campaign, attackers lure victims to fake interview websites crafted using ReactJS. These sites feature dynamic content loaded from JavaScript files and simulate legitimate recruitment processes.

Victims are asked to fill out forms, answer cryptocurrency-related questions, and enable their cameras for interviews.

At a critical point in the process, an error message prompts them to download drivers or scripts—initiating the infection chain.

The infection chain varies depending on the operating system:

  • Windows: A Visual Basic Script (VBS) downloads a NodeJS-based payload (nvidia.js) that extracts malicious components into temporary directories. Persistence is established via registry keys, and a batch file silently launches the GolangGhost backdoor.
  • macOS: A Bash script (coremedia.sh) downloads and extracts malicious files while creating a launch agent plist file for persistence. Before deploying GolangGhost, a stealer named FrostyFerret retrieves system passwords by mimicking Chrome’s UI.

The GolangGhost implant enables remote control and data theft across both platforms. It can execute shell commands, upload/download files, steal browser data (via HackBrowserData), and exfiltrate sensitive information such as system credentials.

Communication with command-and-control (C2) servers is encrypted using RC4 encryption. The malware ensures only one instance runs at a time by storing unique identifiers in temporary files.

Targeting Centralized Finance (CeFi)

Analysis of fake interview websites revealed that Lazarus primarily targets centralized finance (CeFi) entities like Coinbase, Kraken, Bybit, and Robinhood.

Unlike earlier campaigns focused on decentralized finance (DeFi), this shift aligns with DPRK threat actors’ growing interest in CeFi platforms due to their reliance on intermediaries for transactions.

Additionally, job roles advertised in these fake interviews target non-technical profiles such as managers in business development or asset management individuals less likely to detect malicious activity during interviews.

The infection chain relies heavily on sequential execution of commands within short time frames.

Detection opportunities include monitoring unusual script execution patterns via tools like Sigma correlation rules or Sekoia Operating Language (SOL) queries.

For example:

textevents
| where timestamp >= ago(7d)
| where process.command_line contains~ "temp"
| where process.name in ["curl.exe", "powershell.exe", "wscript.exe"]
| aggregate cmd_line = make_set(process.command_line) by host.name, process.parent.pid

Additionally, analyzing registry keys for suspicious entries like cmd.exe can help identify compromised systems.

The ClickFake Interview campaign underscores Lazarus’ adaptability and sophistication in targeting cryptocurrency entities.

By leveraging fake job offers and evolving tactics like ClickFix, the group continues to pose significant threats to centralized finance platforms globally.

Clickfake interview – lazarus hackers exploit windows and macos users fake job campaign 4

Its focus on non-technical employees suggests a strategic pivot aimed at exploiting less vigilant targets while maintaining its overarching goal of financial gain for North Korea.

Are You from SOC/DFIR Team? - Try Free Malware Research with ANY.RUN - Start Now

The post ClickFake Interview – Lazarus Hackers Exploit Windows and macOS Users Fake Job Campaign appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Adecco Group to scale agentic AI at speed with Agentforce 360 license agreement

The Adecco Group. the global talent and technology services company has signed a new, multi-year…

57 minutes ago

Here’s Our First Look at Dwayne Johnson and Bugs Bunny in Fortnite’s Next Season

Epic Games has released key artwork for the next season of Fortnite, confirming the return…

57 minutes ago

Starfield Story DLC, Free Spaceflight Update and PS5 Release Date Confirmed

Bethesda has announced its long-awaited list of updates and additions to Starfield, which fans have…

58 minutes ago

The Elder Scrolls 6 Has Made Todd Howard More Conscious of What He Announces: ‘Just Pretend We Didn’t Announce It’

Bethesda director Todd Howard is tired of being asked about The Elder Scrolls 6, and…

58 minutes ago

Todd Howard Talks Elder Scrolls 6 Progress, Starfield’s PS5 Port, and Bethesda’s Future – IGN Interview

Bethesda Game Studios carries a lot of history with it, so when I visited its…

58 minutes ago

We Saw Starfield’s Big Overhaul and DLC – Is It Enough to Revive Bethesda’s Space RPG?

It's par for the course for developer Bethesda to support its games post-launch with a…

58 minutes ago

This website uses cookies.