<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security Archives - Online Pitstop</title>
	<atom:link href="https://onlinepitstop.com/category/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://onlinepitstop.com/category/cyber-security/</link>
	<description>The best source for news on cybersecurity, cybercrime, privacy and more.</description>
	<lastBuildDate>Thu, 27 Feb 2025 00:56:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>How scammers are exploiting DeepSeek&#8217;s rise</title>
		<link>https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/</link>
					<comments>https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 00:56:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/</guid>

					<description><![CDATA[<p>Digital Security As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing &#x2013; plus, what else to know before using DeepSeek 31 Jan 2025 &#xA0;&#x2022;&#xA0; , 4 min. read It&#x2019;s become almost a clich&#xE9; to say that cybercriminals are remarkably quick to</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/">How scammers are exploiting DeepSeek&#8217;s rise</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="37.179856115108">
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Digital Security</p>
</div>
<p class="sub-title">As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing &#x2013; plus, what else to know before using DeepSeek</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/editor/" title="Editor"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" alt="Editor"></picture></a></div>
</div>
<p class="article-info mb-5">
        <span>31 Jan 2025</span><br />
        <span class="d-none d-lg-inline">&#xA0;&#x2022;&#xA0;</span><br />
        <span class="d-inline d-lg-none">, </span><br />
        <span>4 min. read</span>
    </p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2025/02-25/deepseek.jpeg" media="(max-width: 768px)"></source><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2025/02-25/deepseek.jpeg" media="(max-width: 1120px)"></source><img decoding="async" class="hero-image" src="https://web-assets.esetstatic.com/tn/-x700/wls/2025/02-25/deepseek.jpeg" alt="How scammers are exploiting DeepSeek's rise"></picture>    </div>
</div>
<div readability="130.25608798115">
<p>It&#x2019;s become almost a clich&#xE9; to say that cybercriminals are remarkably quick to latch onto the latest trends and technologies and exploit them for their own nefarious gains. The buzz around DeepSeek and its state-of-the-art AI models is no exception. In fact, the past few days have provided a stark reminder that while the tech world is evolving at a breakneck speed, the tactics of online scammers often remain strikingly familiar.</p>
<p>Since the R1 reasoning model of the little-known Chinese startup took the world by storm last week, security researchers have spotted a number of fraudulent attempts to capitalize on its meteoric rise to popularity. Alongside this, DeepSeek has faced intense scrutiny over its privacy and security practices, bringing to light several risks surrounding (not necessarily only DeepSeek&#x2019;s) AI models.</p>
<p>Here&#x2019;s a rundown of how fraudsters use DeepSeek&#8217;s popularity as a lure for scams and malware, as well as a short recap of some of the key privacy and security issues that have also thrown the spotlight on the company in the past few days.</p>
<h2>Scams and malware</h2>
<p>One example comes from a user on X who posted some details about a website that mimics&#xA0;<a href="https://www.deepseek.com/" target="_blank" rel="noopener">the official one</a> and urges visitors to download what poses as DeepSeek&#8217;s AI model. Instead, however, clicking it triggers the download of a malicious executable that ESET products detect as Win32/Packed.NSIS.A.&#xA0;</p>
<p>While the website largely &#x201C;looks the part&#x201D;, a keen eye will spot at least one more giveaway beside the URL itself: unlike the &#x201C;Start now&#x201D; button on the <a href="https://www.deepseek.com/">official website</a>, the fake one says &#x201C;Download Now&#x201D;. (DeepSeek has launched mobile apps for both iOS and Android <a href="https://www.cnbc.com/2025/01/27/chinas-deepseek-ai-tops-chatgpt-app-store-what-you-should-know.html">with great success</a>, but you can also use it directly in your desktop browser without needing to download anything.) To further bolster the ploy&#8217;s chances of success, the malware is digitally signed by &#x201C;K.MY TRADING TRANSPORT COMPANY LIMITED&#x201D;.</p>
<blockquote class="twitter-tweet"></blockquote>
<p>Others have also <a href="https://x.com/AlvieriD/status/1883450009523282280">spotted</a> a number of newly-created <a href="https://www.linkedin.com/posts/huzeyfe_it-seems-that-threat-actorsbad-guys-are-activity-7289990824115724289-HvNj" target="_blank" rel="noopener">lookalike domains</a> that aim to trick people into thinking that they have landed on the real thing, but are instead to part them from their data or hard-earned money, including by touting (non-existent) <a href="https://cyble.com/blog/deepseeks-growing-influence-sparks-a-surge-in-frauds-and-phishing-attacks/" target="_blank" rel="noopener">DeepSeek pre-IPO shares</a>.</p>
<p>Another risk has to do with bogus <a href="https://cointelegraph.com/news/scam-tokens-surge-deepseek-ai-viral">DeepSeek crypto tokens</a> that have surged on multiple blockchain networks, with some reaching market capitalizations of millions of dollars in short order. The company <a href="https://x.com/deepseek_ai/status/1877663619464478983">made it clear on X</a> earlier in January that it has not issued any cryptocurrency.</p>
<p><a href="https://www.esetworld.com/" target="_blank" rel="noopener"><img decoding="async" src="https://web-assets.esetstatic.com/wls/2025/02-25/eset-world-2025.png" alt="" width="" height=""></a></p>
<h2>Privacy and security concerns surrounding DeepSeek</h2>
<p>Right on the heels of its rapid ascent, DeepSeek said it had itself been the target of &#x201C;a large-scale cyberattack&#x201D; that caused it to <a href="https://www.bleepingcomputer.com/news/security/deepseek-halts-new-signups-amid-large-scale-cyberattack/">suspend new user signups</a>.</p>
<p>Meanwhile, cloud cybersecurity company <a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz has found</a>&#xA0;a database belonging to DeepSeek that inadvertently exposed API keys, system logs, user chat prompts and other sensitive information to the open internet. DeepSeek has since locked down the database.</p>
<p>Cybersecurity firms <a href="https://www.kelacyber.com/blog/deepseek-r1-security-flaws/" target="_blank" rel="noopener">KELA</a> and <a href="https://unit42.paloaltonetworks.com/jailbreaking-deepseek-three-techniques/" target="_blank" rel="noopener">Palo Alto Networks</a> have found that DeepSeek&#x2019;s AI models are susceptible to so-called evil jailbreak attacks and their security guardrails can be subverted to <a href="https://www.welivesecurity.com/en/business-security/untrustworthy-ai-data-poisoning/">generate malicious outputs</a>, including ransomware, as well as fabricate content such as detailed instructions for creating toxins and explosives.</p>
<p>Much like has been the <a href="https://www.welivesecurity.com/2023/03/24/what-tiktok-knows-you-should-know-tiktok/">case with TikTok</a> and other Chinese online services, DeepSeek&#x2019;s <a href="https://platform.deepseek.com/downloads/DeepSeek%20Privacy%20Policy.html" target="_blank" rel="noopener">data collection practices</a> also <a href="https://iapp.org/news/a/deepseek-s-ascension-catches-the-eye-of-international-regulators/" target="_blank" rel="noopener">garnered scrutiny</a> almost immediately, including from regulatory authorities in the United States, Ireland, Italy and France.</p>
<h2>Precautions</h2>
<p>Whether it&#8217;s a viral new app, a juggernaut social media platform, or an AI tool, cybercriminals are highly adept at weaving thee latest fads and trends into their ploys, ultimately making the ruses more enticing and harder to spot.</p>
<p>To protect yourself from DeepSeek-themed scams, keep your eyes peeled for any email or social media messages that attempt to piggyback off its popularity and push you to click on suspicious links.</p>
<p>Indeed, as AI tools can be harnessed to create highly convincing phishing campaigns and other social engineering attacks, be skeptical of messages that arrive out of the blue, particularly if they offer something too good to be true such as <a href="https://www.welivesecurity.com/en/cybersecurity/crypto-soaring-threats-how-keep-wallet-safe/" target="_blank" rel="noopener">investment opportunities</a> or create a sense of urgency. You&#x2019;re better off contacting the company or person mentioned in the messages directly via verified channels and navigating to the official website by typing it into your web browser.</p>
<p>Strengthen your online accounts with <a href="https://www.welivesecurity.com/2019/12/13/2fa-double-down-your-security/" target="_blank" rel="noopener">two-factor authentication</a> (2FA) wherever possible so that it&#x2019;s far harder for cybercriminals to access your accounts even if they obtain your credentials. Make sure to also use multilayered security software across all your devices that can go a long way towards keeping you safe.</p>
<p>More broadly, when interacting with DeepSeek or, indeed, <a href="https://www.welivesecurity.com/en/business-security/security-privacy-challenges-large-language-models/" target="_blank" rel="noopener">any other AI model</a>, be mindful of the data you&#x2019;re entering into it, including names, email addresses and sensitive personal preferences. The same goes for <a href="https://www.welivesecurity.com/2023/05/17/meet-ai-new-colleague-work-company-data/" target="_blank" rel="noopener">corporate and other sensitive data</a>; the <a href="https://time.com/7210875/deepseek-national-security-threat-tiktok/" target="_blank" rel="noopener">US Navy</a>, for example, has already banned use of DeepSeek among its ranks.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/">How scammers are exploiting DeepSeek&#8217;s rise</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/27/how-scammers-are-exploiting-deepseeks-rise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Patch or perish: How organizations can master vulnerability management</title>
		<link>https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/</link>
					<comments>https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 00:53:53 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/</guid>

					<description><![CDATA[<p>Business Security Don&#x2019;t wait for a costly breach to provide a painful reminder of the importance of timely software patching Phil Muncaster 05 Feb 2025 &#xA0;&#x2022;&#xA0; , 5 min. read Vulnerability exploitation has long been a popular tactic for threat actors. But it&#x2019;s becoming increasingly so &#x2013; a fact that should alarm every network defender.</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/">Patch or perish: How organizations can master vulnerability management</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33.951219512195">
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Business Security</p>
</div>
<p class="sub-title">Don&#x2019;t wait for a costly breach to provide a painful reminder of the importance of timely software patching</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2021/04/Phil_Muncaster.jpg" media="(max-width: 768px)"></source></picture></a></p>
<div class="author-text">
<p><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><b>Phil Muncaster</b></a></p>
</div>
</div>
</div>
<p class="article-info mb-5">
        <span>05 Feb 2025</span><br />
        <span class="d-none d-lg-inline">&#xA0;&#x2022;&#xA0;</span><br />
        <span class="d-inline d-lg-none">, </span><br />
        <span>5 min. read</span>
    </p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2025/02-25/software-vulnerability-management.jpeg" media="(max-width: 768px)"></source><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2025/02-25/software-vulnerability-management.jpeg" media="(max-width: 1120px)"></source><img decoding="async" class="hero-image" src="https://web-assets.esetstatic.com/tn/-x700/wls/2025/02-25/software-vulnerability-management.jpeg" alt="Patch or perish: How organizations can master vulnerability management"></picture>    </div>
</div>
<div readability="119.48043565954">
<p>Vulnerability exploitation has long been a popular tactic for threat actors. But it&#x2019;s becoming increasingly so &#x2013; a fact that should alarm every network defender. Observed cases of vulnerability exploitation resulting in data breaches <a href="https://www.verizon.com/about/news/2024-data-breach-investigations-report-vulnerability-exploitation-boom#DBIR2024IntlNR" target="_blank" rel="noopener">surged three-fold</a> annually in 2023, according to one estimate. And attacks targeting security loopholes remain <a href="https://www.coveware.com/blog/2024/7/29/ransomware-actors-pivot-away-from-major-brands-in-q2-2024" target="_blank" rel="noopener">one of the top three ways</a> threat actors start ransomware attacks.</p>
<p>As the number of CVEs continues to hit new record highs, organizations are struggling to cope. They need a more consistent, automated and risk-based approach to mitigating vulnerability-related threats.</p>
<h2>Bug overload</h2>
<p>Software vulnerabilities are inevitable. As long as humans create computer code, human error will creep in to the process, resulting in the bugs that bad actors have become so expert at exploiting. Yet doing so at speed and scale opens a door to not just ransomware and data theft, but sophisticated <a href="https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2024-q3-2024/" target="_blank" rel="noopener">state-aligned espionage operations</a>, destructive attacks and more.</p>
<p>Unfortunately, the <a href="https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/" target="_blank" rel="noopener">number of CVEs being published each year</a> is stubbornly high, thanks to several factors:</p>
<ul>
<li>New software development and continuous integration lead to increased complexity and frequent updates, expanding <a href="https://www.welivesecurity.com/2021/09/14/cyber-attack-surface-reduce/" target="_blank" rel="noopener">potential entry points</a> for attackers and sometimes introducing new vulnerabilities. At the same time, companies adopt new tools that often rely on third-party components, open-source libraries and other dependencies that may contain undiscovered vulnerabilities.</li>
<li>Speed is often prioritized over security, meaning software is being developed without adequate code checks. This allows bugs to creep into production code &#x2013; sometimes coming from the open source components used by developers.</li>
<li>Ethical researchers are upping their efforts, thanks in part to a proliferation of bug bounty programs run by organizations as diverse as the Pentagon and Meta. These are responsibly disclosed and patched by the vendors in question, but if customers don&#x2019;t apply these patches, they&#x2019;ll be exposed to exploits</li>
<li>Commercial spyware vendors operate in a legal grey area, selling malware and exploits for their clients &#x2013; often autocratic governments &#x2013; to spy on their enemies. The UK&#x2019;s National Cyber Security Centre (NCSC) <a href="https://www.infosecurity-magazine.com/news/governments-tech-giants-against/" target="_blank" rel="noopener">estimates</a> that the commercial &#x201C;cyber-intrusion sector&#x201D; doubles every ten years</li>
<li>The cybercrime supply chain is increasingly professionalized, with initial access brokers (IABs) focusing exclusively on breaching victim organizations &#x2013; often via vulnerability exploitation. One <a href="https://www.group-ib.com/resources/research-hub/hi-tech-crime-trends-2022/" target="_blank" rel="noopener">report from 2023</a> recorded a 45% increase in IABs on cybercrime forums, and a doubling of dark web IAB ads in 2022 versus the previous 12 months</li>
</ul>
<h2>What types of vulnerability are making waves?</h2>
<p>The story of the vulnerability landscape is one of both change and continuity. Many of the usual suspects appear in <a href="https://www.bleepingcomputer.com/news/security/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses/" target="_blank" rel="noopener">MITRE&#x2019;s top 25 list</a> of the most common and dangerous software flaws seen between June 2023 and June 2024. They include commonly-seen vulnerability categories like cross-site scripting, SQL injection, use after free, out-of-bounds read, code injection and cross-site request forgery (CSRF). These should be familiar to most cyber-defenders, and may therefore require less effort to mitigate, either through improved hardening/protection of systems and/or enhanced DevSecOps practices.</p>
<p>However, other trends are perhaps even more concerning. The US Cybersecurity and Infrastructure Security Agency (CISA) <a href="https://www.cisa.gov/sites/default/files/2024-11/aa24-317a-2023-top-routinely-exploited-vulnerabilities.pdf" target="_blank" rel="noopener">claims in its list</a> of <em>2023 Top Routinely Exploited Vulnerabilities </em>that a majority of these flaws were initially exploited as a zero-day. This means, at the time of exploitation, there were no patches available, and organizations have to rely on other mechanisms to keep them safe or to minimize the impact. Elsewhere, bugs with low complexity and which require little or no user interaction are also often favored. An example is the <a href="https://www.welivesecurity.com/en/mobile-security/silent-but-deadly-the-rise-of-zero-click-attacks/" target="_blank" rel="noopener">zero-click exploits</a> offered by <a href="https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/">commercial spyware vendors</a> to deploy their malware.</p>
<blockquote readability="5.5081967213115">
<p><em>Explore how <a href="https://www.eset.com/us/business/solutions/vulnerability-patch-management/" target="_blank" rel="noopener">ESET Vulnerability and Patch Management</a> inside the ESET PROTECT platform provides a pathway to swift remediation, helping keep both disruption and costs down to a minimum.</em></p>
</blockquote>
<p>Another trend is of targeting perimeter-based products with vulnerability exploitation. The National Cyber Security Centre (NCSC) <a href="https://www.ncsc.gov.uk/blog-post/products-on-your-perimeter">has warned</a> of an uptick in such attacks, often involving zero-day exploits targeting file transfer applications, firewalls, VPNs and mobile device management (MDM) offerings. It says:</p>
<p><em>&#8220;Attackers have realised that the majority of perimeter-exposed products aren&#8217;t &#x2018;secure by design&#x2019;, and so vulnerabilities can be found far more easily than in popular client software. Furthermore, these products typically don&#x2019;t have decent logging (or can be easily forensically investigated), making perfect footholds in a network where every client device is likely to be running high-end detective capabilities.&#8221;</em></p>
<h2>Making things worse</h2>
<p>As if that weren&#x2019;t enough to concern network defenders, their efforts are complicated further by:</p>
<ul>
<li>The sheer speed of vulnerability exploitation. <a href="https://www.welivesecurity.com/en/videos/threat-actors-exploiting-zero-days-faster-ever-week-security-tony-anscombe/">Google Cloud research</a> estimates an average time-to-exploit of just five days in 2023, down from a previous figure of 32 days</li>
<li>The complexity of today&#x2019;s enterprise IT and OT/IoT systems, which span hybrid and multi-cloud environments with often-siloed legacy technology</li>
<li>Poor quality vendor patches and confusing communications, <a href="https://assured.co.uk/2024/patching-problems-why-vendor-security-updates-are-letting-down-customers/">which leads defenders</a> to duplicate effort and means they&#x2019;re often unable to effectively gauge their risk exposure</li>
<li>A <a href="https://www.darkreading.com/vulnerabilities-threats/nist-needs-help-digging-out-of-its-vulnerability-backlog" target="_blank" rel="noopener">NIST NVD backlog</a> which has left many organizations without a critical source of up-to-date information on the latest CVEs</li>
</ul>
<p>According to a <a href="https://www.verizon.com/business/en-gb/resources/reports/dbir/" target="_blank" rel="noopener">Verizon analysis</a> of CISA&#x2019;s Known Exploited Vulnerabilities (KEV) catalog:</p>
<ul>
<li>At 30 days 85% of vulnerabilities went unremediated</li>
<li>At 55 days, 50% of vulnerabilities went unremediated</li>
<li>At 60 days 47% of vulnerabilities went unremediated</li>
</ul>
<h2>Time to patch</h2>
<p>The truth is that there are simply too many CVEs published each month, across too many systems, for enterprise IT and security teams to patch them all. The focus should therefore be on prioritizing effectively according to risk appetite and severity. Consider the following features for any <a href="https://www.eset.com/int/business/solutions/vulnerability-patch-management/" target="_blank" rel="noopener">vulnerability and patch management solution</a>:</p>
<ul>
<li>Automated scanning of enterprise environments for known CVEs</li>
<li>Vulnerability prioritization based on severity</li>
<li>Detailed reporting to identify vulnerable software and assets, relevant CVEs and patches etc</li>
<li>Flexibility to select specific assets for patching according to enterprise needs</li>
<li>Automated or manual patching options</li>
</ul>
<p>For zero-day threats, consider <a href="https://www.eset.com/int/business/solutions/advanced-threat-defense/#solutions" target="_blank" rel="noopener">advanced threat detection</a> which automatically unpacks and scans possible exploits, executing in a cloud-based sandbox to check whether it&#x2019;s malicious or not. Machine learning algorithms can be applied to the code to identify novel threats with a high degree of accuracy in minutes, automatically blocking them and providing a status of each sample.</p>
<p>Other tactics could include microsegmentation of networks, <a href="https://www.welivesecurity.com/2021/07/23/protecting-hybrid-workplace-zero-trust-security/" target="_blank" rel="noopener">zero trust network access</a>, network monitoring (for unusual behavior), and strong <a href="https://www.welivesecurity.com/2022/06/07/cybersecurity-awareness-training-what-is-it-what-works-best/" target="_blank" rel="noopener">cybersecurity awareness programs</a>.</p>
<p>As threat actors adopt AI tools of their own in ever-greater numbers, it will become easier for them to scan for vulnerable assets that are exposed to internet-facing attacks. In time, they may even be able to use GenAI to help find zero-day vulnerabilities. The best defense is to stay informed and keep a regular dialog going with your trusted security partners.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/">Patch or perish: How organizations can master vulnerability management</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/26/patch-or-perish-how-organizations-can-master-vulnerability-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How AI-driven identify fraud is causing havoc</title>
		<link>https://onlinepitstop.com/2025/02/25/how-ai-driven-identify-fraud-is-causing-havoc/</link>
					<comments>https://onlinepitstop.com/2025/02/25/how-ai-driven-identify-fraud-is-causing-havoc/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 25 Feb 2025 00:53:17 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/25/how-ai-driven-identify-fraud-is-causing-havoc/</guid>

					<description><![CDATA[<p>Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent &#x2013; here&#8217;s how to fight back Phil Muncaster 11 Feb 2025 &#xA0;&#x2022;&#xA0; , 4 min. read Artificial intelligence (AI) is transforming our world in ways both expected and unforeseen. For consumers, the technology means more accurately personalized digital content, better</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/25/how-ai-driven-identify-fraud-is-causing-havoc/">How AI-driven identify fraud is causing havoc</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="35.755274261603">
<p class="sub-title">Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent &#x2013; here&#8217;s how to fight back</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2021/04/Phil_Muncaster.jpg" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2021/04/Phil_Muncaster.jpg" alt="Phil Muncaster"></picture></a></p>
<div class="author-text">
<p><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><b>Phil Muncaster</b></a></p>
</div>
</div>
</div>
<p class="article-info mb-5">
        <span>11 Feb 2025</span><br />
        <span class="d-none d-lg-inline">&#xA0;&#x2022;&#xA0;</span><br />
        <span class="d-inline d-lg-none">, </span><br />
        <span>4 min. read</span>
    </p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2025/02-25/identity-fraud-ai.jpeg" media="(max-width: 768px)"></source><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2025/02-25/identity-fraud-ai.jpeg" media="(max-width: 1120px)"></source><img decoding="async" class="hero-image" src="https://web-assets.esetstatic.com/tn/-x700/wls/2025/02-25/identity-fraud-ai.jpeg" alt="How AI-driven identify fraud is causing havoc"></picture>    </div>
</div>
<div readability="70.234308943089">
<p>Artificial intelligence (AI) is transforming our world in ways both expected and unforeseen. For consumers, the technology means more accurately personalized digital content, better healthcare diagnostics, real-time language translation to help on holiday, and generative AI assistants to enhance productivity at work. But AI is also <a href="https://www.welivesecurity.com/en/cybersecurity/cybersecurity-ai-what-2025-have-store/" target="_blank" rel="noopener">used to help cybercriminals</a> be more productive, especially when it comes to identity fraud &#x2013; the most <a href="https://www.cifas.org.uk/insight/reports-trends" target="_blank" rel="noopener">common fraud type today</a>.</p>
<p>Over a third of banking risk and innovation leaders in the UK, Spain and US <a href="https://investors.miteksystems.com/news-releases/news-release-details/soaring-scam-and-fraud-sophistication-remains-top-challenge" target="_blank" rel="noopener">cite their biggest challenge today</a> as the rise of AI-generated fraud and deepfakes, making it the number one answer. So how does AI-powered fraud work and what can you do to stay safe?</p>
<h2>How does AI-driven identity fraud work?</h2>
<p>Identity fraud refers to the use of your personally identifiable information (PII) to commit a crime, such as running up credit card debt in your name, or accessing a bank or other account. According to <a href="https://www.signicat.com/the-battle-against-ai-driven-identity-fraud" target="_blank" rel="noopener">one estimate</a>, AI-driven fraud now accounts for over two-fifths (43%) of all fraud attempts recorded by the financial and payments sector. Nearly a third (29%) of those attempts are thought to be successful. So how is AI helping the cybercriminals?</p>
<p>There are several different tactics we can highlight:</p>
<ul>
<li><strong>Deepfake account takeovers (ATOs) and account creation:</strong> Scammers are using deepfake audio and video likenesses of legitimate users to bypass the Know Your Customer (KYC) checks used by financial services companies to verify customers are who they say they are. An image or video of you is scraped from the web and fed into a deepfake tool or generative AI. It&#x2019;s then inserted into the data stream between user and service provider in so-called injection attacks designed to fool the authentication systems. <a href="https://www.infosecurity-magazine.com/news/deepfake-identity-attack-every/" target="_blank" rel="noopener">One report claims</a> that deepfakes now account for a quarter (24%) of fraudulent attempts to pass motion-based biometrics checks and 5% of static selfie-based checks.</li>
<li><strong>Document forgeries:</strong> There was a time when fraudsters used physical document forgeries, such as faked passport pages, to open new accounts in the names of unassuming victims. However, they&#x2019;re more likely today to do so digitally. According to <a href="https://www.entrust.com/sites/default/files/documentation/executive-summaries/2025-fraud-identity-exec-summary.pdf">this report</a>, digital forgeries account for over 57% of all document fraud &#x2013; a 244% annual increase. Scammers will typically access document templates online or download document images stolen in data breaches and then alter the details in Photoshop. Generative AI (GenAI) tools are helping them to do this at speed and scale.</li>
<li><strong>Synthetic fraud</strong>: This is where scammers either create new identities by combining real (stolen) and made-up PII to form a completely new (synthetic) identity, or create a new identity using just fabricated data. This is then used to open new accounts with banks and credit card firms, for example. Document forgeries and deepfakes can be combined with these identities to increase the fraudsters&#x2019; chances of success. According to<a href="https://www.deduce.com/resource/wakefield-research-report/" target="_blank" rel="noopener"> one report</a>, 76% of US fraud and risk professionals think their organization has synthetic customers. They estimate that this type of fraud has surged 17% annually.</li>
<li><strong>Deepfakes that trick friends and family:</strong> Sometimes, fake video or audio can be used in scams that trick even loved ones. One tactic is <a href="https://www.welivesecurity.com/en/scams/virtual-kidnapping-see-through-scam/" target="_blank" rel="noopener">virtual kidnapping</a>, where relatives receive a phone call from a threat actor claiming to have kidnapped you. They play a deepfake audio of your voice for proof and then demand a ransom. GenAI can also used in these efforts to help the scammers source a likely victim. ESET Global Security Advisor <a href="https://www.welivesecurity.com/en/our-experts/jake-moore/">Jake Moore</a> gave a taste of what is currently possible <a href="https://www.welivesecurity.com/en/cybercrime/the-grand-theft-of-jake-moores-voice-the-concept-of-a-virtual-kidnap/">here</a> and <a href="https://www.welivesecurity.com/en/cybersecurity/eset-world-2024-big-prevention-bigger-ai/">here</a>.</li>
<li><strong>Credential stuffing (for ATO):</strong> Credential stuffing involves the use of stolen log-ins in automated attempts to access other accounts for which you may have used the same username and password. AI-powered tools could rapidly generate these credential lists from multiple sources of data, helping to scale attacks. And they could also be used to accurately mimic human behavior while logging in, in order to trick defensive filters.</li>
</ul>
<p><a href="https://www.esetworld.com/" target="_blank" rel="noopener"><img decoding="async" src="https://web-assets.esetstatic.com/wls/2025/02-25/eset-world-2025.png" alt="" width="" height=""></a></p>
<h2>What&#x2019;s the impact of AI-based fraud?</h2>
<p>Fraud is far from a victimless crime. In fact, AI-powered fraud can:</p>
<ul>
<li>Cause major emotional distress for the individual that&#x2019;s defrauded. <a href="https://www.idtheftcenter.org/publication/2023-consumer-impact-report/" target="_blank" rel="noopener">One report</a>&#xA0;claims that 16% of victims contemplated suicide as a result of an identity crime</li>
<li>Make scams more likely to succeed, eating into profits, which forces companies to put their prices up for everyone</li>
<li>Impact the national economy. Lower profits mean lower tax receipts, which in turn mean less cash to spend on public services</li>
<li>Undermine public confidence in the rule of law and even democracy</li>
<li>Undermine business confidence, potentially leading to lower levels of investment into the country</li>
</ul>
<h2>How to keep your identity safe from AI-driven fraud</h2>
<p>To combat the offensive use of AI against them, organizations are increasingly turning to defensive AI tools to spot the tell-tale signs of fraud. But what can you do? Perhaps the most effective strategy is to minimize opportunities for threat actors to obtain your PII and audio/video data in the first place. That means:</p>
<ul>
<li>Don&#x2019;t <a href="https://www.welivesecurity.com/en/social-media/10-things-avoid-posting-social-media-why/" target="_blank" rel="noopener">overshare information on social media</a> and restrict your privacy settings</li>
<li>Be phishing aware: check sender domains, look for typos and grammatical mistakes, and never click on links or open attachments in unsolicited emails</li>
<li>Turn on multifactor-authentication (MFA) on all accounts</li>
<li>Always use strong, unique passwords stored in a <a href="https://www.welivesecurity.com/2023/04/11/10-things-look-buying-password-manager/" target="_blank" rel="noopener">password manager</a></li>
<li>Keep software up to date on all laptops and mobile devices</li>
<li>Keeping a close eye on bank and card accounts, regularly checking for suspicious activity and freezing accounts immediately if something doesn&#x2019;t look right</li>
<li>Install multi-layered security software from a reputable vendor on all devices</li>
</ul>
<p>Also consider staying aware of the latest AI-powered fraud tactics and educating friends and family about deepfakes and AI fraud.</p>
<p>AI-driven fraud attacks will only continue to grow as the technology gets cheaper and more effective. As this new cyber-arms race plays out between corporate network defenders and their adversaries, it&#x2019;s consumers that will be caught in the middle. Make sure you&#x2019;re not next.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/25/how-ai-driven-identify-fraud-is-causing-havoc/">How AI-driven identify fraud is causing havoc</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/25/how-ai-driven-identify-fraud-is-causing-havoc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Neil Lawrence: What makes us unique in the age of AI &#124; Starmus highlights</title>
		<link>https://onlinepitstop.com/2025/02/24/neil-lawrence-what-makes-us-unique-in-the-age-of-ai-starmus-highlights/</link>
					<comments>https://onlinepitstop.com/2025/02/24/neil-lawrence-what-makes-us-unique-in-the-age-of-ai-starmus-highlights/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 00:52:47 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/24/neil-lawrence-what-makes-us-unique-in-the-age-of-ai-starmus-highlights/</guid>

					<description><![CDATA[<p>WeLiveScience As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human? 10 Feb 2025 In his talk, Neil Lawrence, the Deep Mind Professor of Machine Learning at the University of Cambridge, tackles the aforementioned fundamental question head-on. With a career</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/24/neil-lawrence-what-makes-us-unique-in-the-age-of-ai-starmus-highlights/">Neil Lawrence: What makes us unique in the age of AI | Starmus highlights</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="36.192727272727">
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">WeLiveScience</p>
</div>
<p class="sub-title">As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human?</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/editor/" title="Editor"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" alt="Editor"></picture></a></div>
</div>
<p class="article-info mb-5">
        <span>10 Feb 2025</span>
    </p>
</div>
<div readability="59.803637200737">
<p>In his talk, <a href="https://www.starmus.com/person/neil-lawrence" target="_blank" rel="noopener">Neil Lawrence</a>, the Deep Mind Professor of Machine Learning at the University of Cambridge, tackles the aforementioned fundamental question head-on. With a career dedicated to understanding the intersection of technology and human potential, Mr. Lawrence explores how intelligent systems can complement, rather than replace, human capabilities. At the heart of his talk is the notion of the &#x201C;atomic human&#x201D; &#x2013; a philosophical and technical perspective on what distinguishes us from machines.</p>
<p>Indeed, Mr. Lawrence goes on to examine how technological breakthroughs have forced us to reconsider the traits we hold as inherently human. Each time a machine did something we thought was uniquely human, it cut something away from us. And as this process continues, is there a final frontier &#x2013; a moment where machines can no longer cut something away from us and take away our capabilities? And if we find what that moment is, does it tell us something about the essence of humanity?</p>
<p>By drawing parallels between AI&#x2019;s rapid evolution and some of history&#x2019;s greatest human achievements &#x2013; from the Apollo missions to Amelia Earhart&#x2019;s daring flights &#x2013; Mr. Lawrence illustrates how technology has been a tool to augment human ingenuity, not a force to erase it. With AI reaching further into areas once thought unreachable, the challenge lies in ensuring that we shape it as a tool for empowerment, rather than let it redefine our identity.</p>
<blockquote readability="14.256302521008">
<div readability="17.457286432161">ESET&#x2019;s commitment to promoting scientific innovation and progress is seen in its ongoing efforts to foster a deep appreciation for science, celebrate the power of groundbreaking research, and connect with leading thinkers in technology and science. ESET recently partnered with Starmus, the global science communication festival, and brought its <a href="https://www.starmus.com/Slovakia" target="_blank" rel="noopener">7<sup>th</sup>&#xA0;edition</a> to Bratislava, Slovakia, in May 2024.</div>
<p>The festival featured a number of thought-provoking perspectives from some of the planet&#x2019;s foremost thinkers. You can now relive the experience from the comfort of your home and get a taste of how the power of technology is being harnessed to tackle some of the most pressing challenges facing the world today.</p>
</blockquote>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/24/neil-lawrence-what-makes-us-unique-in-the-age-of-ai-starmus-highlights/">Neil Lawrence: What makes us unique in the age of AI | Starmus highlights</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/24/neil-lawrence-what-makes-us-unique-in-the-age-of-ai-starmus-highlights/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DeceptiveDevelopment targets freelance developers</title>
		<link>https://onlinepitstop.com/2025/02/23/deceptivedevelopment-targets-freelance-developers/</link>
					<comments>https://onlinepitstop.com/2025/02/23/deceptivedevelopment-targets-freelance-developers/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 23 Feb 2025 00:45:35 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/23/deceptivedevelopment-targets-freelance-developers/</guid>

					<description><![CDATA[<p>Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers. After all, what better time to strike than when the potential victim is distracted by the possibility of getting a job? Since early 2024, ESET researchers have observed a series of malicious North Korea-aligned activities,</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/23/deceptivedevelopment-targets-freelance-developers/">DeceptiveDevelopment targets freelance developers</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers. After all, what better time to strike than when the potential victim is distracted by the possibility of getting a job? Since early 2024, ESET researchers have observed a series of malicious North Korea-aligned activities, where the operators, posing as headhunters, try to serve their targets with software projects that conceal infostealing malware. We call this activity cluster DeceptiveDevelopment.</p>
<p>As part of a fake job interview process, the DeceptiveDevelopment operators ask their targets to do a coding test, such as adding a feature to an existing project, with the files necessary for the task usually hosted on private repositories on GitHub or other similar platforms. Unfortunately for the eager work candidate, these files are trojanized: once they download and execute the project, the victim&#x2019;s computer gets compromised with the operation&#x2019;s first-stage malware, BeaverTail.</p>
<p>DeceptiveDevelopment was first publicly described by <a href="https://blog.phylum.io/smuggling-malware-in-test-code/" target="_blank" rel="noopener">Phylum</a> and <a href="https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/" target="_blank" rel="noopener">Unit 42</a> in 2023, and has already been partially documented under the names Contagious Interview and DEV#POPPER. We have conducted further analysis of this activity cluster and its operator&#x2019;s initial access methods, network infrastructure, and toolset, including new versions of the two malware families used by DeceptiveDevelopment &#x2013; InvisibleFerret, and the aforementioned BeaverTail.</p>
<blockquote readability="5">
<p><strong>Key points of this blogpost:</strong></p>
<ul>
<li>DeceptiveDevelopment targets freelance software developers through spearphishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers.</li>
<li>Active since at least November 2023, this operation primarily uses two malware families &#x2013; BeaverTail (infostealer, downloader) and InvisibleFerret (infostealer, RAT).</li>
<li>DeceptiveDevelopment&#x2019;s tactics, techniques, and procedures (TTPs) are similar to several other known North Korea-aligned operations.</li>
</ul>
</blockquote>
<p>We first observed this DeceptiveDevelopment campaign in early 2024, when we discovered trojanized projects hosted on GitHub with malicious code hidden at the end of long comments, effectively moving the code off-screen. These projects delivered the BeaverTail and InvisibleFerret malware. In addition to analyzing the two malware families, we also started investigating the C&amp;C infrastructure behind the campaign. Since then, we have been tracking this cluster and its advances in strategy and tooling used in these ongoing attacks. This blogpost describes the TTPs of this campaign, as well as the malware it uses.</p>
<h2>DeceptiveDevelopment profile</h2>
<p>DeceptiveDevelopment is a North Korea-aligned activity cluster that we currently do not attribute to any known threat actor. Operators behind DeceptiveDevelopment target software developers on Windows, Linux, and macOS. They primarily steal cryptocurrency for financial gain, with a possible secondary objective of cyberespionage.</p>
<p>To approach their targets, these operators use fake recruiter profiles on social media, not unlike the Lazarus group in Operation DreamJob (as described in <a href="https://www.welivesecurity.com/en/eset-research/lazarus-luring-employees-trojanized-coding-challenges-case-spanish-aerospace-company/">this WeLiveSecurity blogpost</a>). However, while Operation DreamJob targeted defense and aerospace engineers, DeceptiveDevelopment reaches out to freelance software developers, often those involved in cryptocurrency projects. To compromise its victims&#x2019; computers, DeceptiveDevelopment provides its targets with trojanized codebases that deploy backdoors as part of a faux job interview process.</p>
<h3>Victimology</h3>
<p>The primary targets of this DeceptiveDevelopment campaign are software developers, mainly those involved in cryptocurrency and decentralized finance projects. The attackers don&#x2019;t distinguish based on geographical location and aim to compromise as many victims as possible to increase the likelihood of successfully extracting funds and information.</p>
<p>We have observed hundreds of different victims around the world, using all three major operating systems &#x2013; Windows, Linux, and macOS. They ranged from junior developers just starting their freelance careers to highly experienced professionals in the field. We only observed attacker&#x2013;victim conversations in English, but cannot say with certainty that the attackers will not use translation tools to communicate with victims who don&#x2019;t speak that language. A map showing the global distribution of victims can be seen in Figure 1.</p>
<figure class="image"><img decoding="async" title="Figure 1. Heatmap of different victims of DeceptiveDevelopment" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-1-1.png" alt="Figure 1. Heatmap different victims of DeceptiveDevelopment" width="" height=""><figcaption><em>Figure 1. Heatmap of different victims of DeceptiveDevelopment</em></figcaption></figure>
<h3>Attribution</h3>
<p>We consider DeceptiveDevelopment to be a North Korea-aligned activity cluster with high confidence based on several elements:</p>
<ul>
<li>We observed connections between GitHub accounts controlled by the attackers and accounts containing fake CVs used by <a href="https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat" target="_blank" rel="noopener">North Korean IT workers</a>. These people apply for jobs in foreign companies under false identities in order to collect salaries to help fund the regime. The observed connections were mutual follows between GitHub profiles where one side was associated with DeceptiveDevelopment, and the other contained fake CVs and other material related to North Korean IT worker activity. Similar connections were also observed by <a href="https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/">Unit42</a>. Unfortunately, the GitHub pages were taken down before we were able to record all the evidence.</li>
<li>The TTPs (use of fake recruiters, trojanized job challenges, and software used during interviews) are similar to other North Korea-aligned activity (<a href="https://www.microsoft.com/en-us/security/blog/2024/05/28/moonstone-sleet-emerges-as-new-north-korean-threat-actor-with-new-bag-of-tricks/">Moonstone Sleet</a>, and Lazarus&#x2019;s DreamJob and <a href="https://web.archive.org/web/20230523021517/https:/threatbook.cn/ppt/The%20Nightmare%20of%20Global%20Cryptocurrency%20Companies%20-%20Demystifying%20the%20%E2%80%9CDangerousPassword%E2%80%9D%20of%20the%20APT%20Organization.pdf" target="_blank" rel="noopener">DangerousPassword</a> campaigns).</li>
</ul>
<p>In addition to the connections between the GitHub profiles, the malware used in DeceptiveDevelopment is rather simple. This tracks with the reporting done by <a href="https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat" target="_blank" rel="noopener">Mandiant</a> claiming that the IT workers&#x2019; work is usually of poor quality.</p>
<p>While monitoring DeceptiveDevelopment activity, we saw numerous cases showing a lack of attention to detail on the part of the threat actors. In some of them, the authors failed to remove development notes or commented-out local IP addresses used for development and testing. We also saw samples where they seem to have forgotten to obfuscate the C&amp;C address after changing it; this can be seen in Figure 2. Furthermore, the malware uses freely available obfuscation tools with links to them sometimes left in code comments.</p>
<figure class="image"><img decoding="async" title="Figure 2. Examples of comments and obfuscation forgotten in the code" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-2-1-2-3-4.png" alt="Figure 2. Examples of comments and obfuscation" width="" height=""><figcaption><em>Figure 2. Examples of comments and obfuscation forgotten in the code</em></figcaption></figure>
<h2>Technical analysis</h2>
<h3>Initial access</h3>
<p>In order to pose as recruiters, the attackers copy profiles of existing people or even construct new personas. They then either directly approach their potential victims on job-hunting and freelancing platforms or post fake job listings there. At first, the threat actors used brand new profiles and would simply send links to malicious GitHub projects via LinkedIn to their intended targets. Later, they started using profiles that appear established, with many followers and connections, to look more trustworthy, and branched out to more job-hunting and code-hosting websites. While some of these profiles are set up by the attackers themselves, others are potentially compromised profiles of real people on the platform, modified by the attackers.</p>
<p>Some of the platforms where these interactions occur are generic job-hunting ones, while others focus primarily on cryptocurrency and blockchain projects and are thus more in line with the attackers&#x2019; goals. The platforms include:</p>
<ul>
<li>LinkedIn,</li>
<li>Upwork,</li>
<li>Freelancer.com,</li>
<li>We Work Remotely,</li>
<li>Moonlight, and</li>
<li>Crypto Jobs List.</li>
</ul>
<p>The most commonly observed compromise vector consists of the fake recruiter providing the victim with a trojanized project under the guise of a hiring challenge or helping the &#x201C;recruiter&#x201D; fix a bug for a financial reward.</p>
<p>Victims receive the project files either directly via file transfer on the site or through a link to a repository like GitHub, GitLab, or Bitbucket. They are asked to download the files, add features or fix bugs, and report back to the recruiter. Additionally, they are instructed to build and execute the project in order to test it, which is where the initial compromise happens. The repositories used are usually private, so the victim is first asked to provide their account ID or email address to be granted access to them, most likely to conceal the malicious activity from researchers.</p>
<p>Despite that, we observed many cases where these repositories were publicly available, but realized that these belong mostly to victims who, after completing their tasks, uploaded them to their own repositories. Figure 3 shows an example of a trojanized project hosted on GitHub. We have reported all observed malicious code to the affected services.</p>
<figure class="image align-center"><img decoding="async" title="Figure 3. README of a trojanized GitHub project" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-3.png" alt="Figure 3. README of a trojanized GitHub project" width="" height=""><figcaption><em>Figure 3. README of a trojanized GitHub project</em></figcaption></figure>
<p>The trojanized projects fall into one of four categories:</p>
<ul>
<li>hiring challenges,</li>
<li>cryptocurrency projects,</li>
<li>games (usually with blockchain functionality), and</li>
<li>gambling with blockchain/cryptocurrency features.</li>
</ul>
<p>These repositories are often duplicates of existing open-source projects or demos, with little to no change aside from adding the malicious code and changing the README file. Some of the malicious project names and names of attacker-controlled accounts operating them (where we could assess them) are listed in Table 1.</p>
<p><em>Table 1. Observed project names and repository/commit authors</em></p>
<table border="0" width="642" cellspacing="0" cellpadding="0">
<thead>
<tr>
<td width="161"><strong>Project</strong></td>
<td nowrap width="161"><strong>Author</strong></td>
<td nowrap width="161"><strong>Project</strong></td>
<td nowrap width="161"><strong>Author</strong></td>
</tr>
</thead>
<tbody>
<tr>
<td nowrap width="161">Website-Test</td>
<td nowrap width="161">Hiring-Main-Support</td>
<td nowrap width="161">casino-template-paid</td>
<td nowrap width="161">bmstore</td>
</tr>
<tr>
<td nowrap width="161">guru-challenge</td>
<td nowrap width="161">Chiliz-Guru</td>
<td nowrap width="161">casino-demo</td>
<td nowrap width="161">casinogamedev</td>
</tr>
<tr>
<td nowrap width="161">baseswap_ver_4</td>
<td nowrap width="161">artemreinv</td>
<td nowrap width="161">point</td>
<td nowrap width="161">freebling-v3</td>
</tr>
<tr>
<td nowrap width="161">metaverse-backend</td>
<td nowrap width="161">metaverse-ritech</td>
<td nowrap width="161">Blockchain-game</td>
<td nowrap width="161">N/A</td>
</tr>
<tr>
<td nowrap width="161">lisk-parknetwork</td>
<td nowrap width="161">MariaMar1809</td>
<td nowrap width="161">3DWorld-tectera-beta</td>
<td nowrap width="161">N/A</td>
</tr>
</tbody>
</table>
<p>We also observed the attackers impersonating existing projects and companies by using similar names or appending <span>LLC</span>, <span>Ag</span>, or <span>Inc</span> (abbreviations of legal company types) to the names, as seen in Table 2.</p>
<p><em>Table 2. Observed project names and repository/commit authors impersonating legitimate projects</em></p>
<table border="1" width="642" cellspacing="0" cellpadding="0">
<thead>
<tr>
<td width="321"><strong>Project</strong></td>
<td nowrap width="321"><strong>Author</strong></td>
</tr>
</thead>
<tbody>
<tr>
<td nowrap width="321">Lumanagi-Dex</td>
<td nowrap width="321">LUMANAGI-LLC</td>
</tr>
<tr>
<td nowrap width="321">DARKROOM-NFT</td>
<td nowrap width="321">DarkRoomAg</td>
</tr>
<tr>
<td nowrap width="321">DarkRoom</td>
<td nowrap width="321">WonderKiln-Inc</td>
</tr>
</tbody>
</table>
<p>The attackers often use a clever trick to hide their malicious code: they place it in an otherwise benign component of the project, usually within backend code unrelated to the task given to the developer, where they append it as a single line behind a long comment. This way, it is moved off-screen and stays hidden unless the victim scrolls to it or has the word wrap feature of their code editor enabled. Interestingly, GitHub&#x2019;s own code editor does not enable word wrap, so the malicious code is easy to miss even when looking at code in the repository, as shown in Figure 4.</p>
<figure class="image"><img decoding="async" title="Figure 4. Malicious code appended after a long comment pushing it off-screen in GitHub&#x2019;s code editor (top) and the page source of just line #1 as seen in a code editor with word wrapping enabled (bottom)" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-4-1-2.png" alt="Figure 4. Malicious code appended after a long comment" width="" height=""><figcaption><em>Figure 4. Malicious code appended after a long comment pushing it off-screen in GitHub&#x2019;s code editor (top) and the page source of just line #1 as seen in a code editor with word wrapping enabled (bottom)</em></figcaption></figure>
<p>Another compromise vector we observed consisted of the fake recruiter inviting the victim to a job interview using an online conferencing platform and providing a link to a website from which the necessary conferencing software can be downloaded. The website is usually a clone of an existing conferencing platform&#x2019;s website, as seen in Figure 5, and the downloaded software contains the first stage of the malware.</p>
<figure class="image"><img decoding="async" title="Figure 5. Malicious website at mirotalk[.]net, a copy of the legitimate MiroTalk site (sfu.mirotalk.com), serving malware disguised as conferencing software via a click of the Join Room button." src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-5.png" alt="Figure 5. Malicious website at mirotalk[.]net" width="" height=""><figcaption><em>Figure 5. Malicious website at </em><span>mirotalk[.]net</span><em>, a copy of the legitimate MiroTalk site (</em><span>sfu.mirotalk.com</span><em>), serving malware disguised as conferencing software via a click of the </em><span>Join&#xA0;Room</span><em> button</em></figcaption></figure>
<h3>Toolset</h3>
<p>DeceptiveDevelopment primarily uses two malware families as part of its activities, delivered in two stages. The first stage, BeaverTail, has both a JavaScript and a native variant (written in C++ using the Qt platform), and is delivered to the victim, disguised as a part of a project the victim is asked to work on, a hiring challenge, or inside trojanized remote conferencing software such as <a href="https://meet.no42.org/" target="_blank" rel="noopener">MiroTalk</a> or <a href="https://freeconference.com/" target="_blank" rel="noopener">FreeConference</a>.</p>
<p>BeaverTail acts as a simple login stealer, extracting browser databases containing saved logins, and as a downloader for the second stage, InvisibleFerret. This is modular Python-based malware that includes spyware and backdoor components, and is also capable of downloading the legitimate <a href="https://anydesk.com/en" target="_blank" rel="noopener">AnyDesk</a> remote management and monitoring software for post-compromise activities. Figure 6 shows the full compromise chain from initial compromise, through data exfiltration, to the deployment of AnyDesk.</p>
<figure class="image"><img decoding="async" title="Figure 6. DeceptiveDevelopment compromise chain" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-6-1.png" alt="Figure 6. DeceptiveDevelopment &#x2013; compromise chain" width="" height=""><figcaption><em>Figure 6. DeceptiveDevelopment compromise chain</em></figcaption></figure>
<p>Both BeaverTail and InvisibleFerret have been previously documented by <a href="https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/" target="_blank" rel="noopener">Unit 42</a>, <a href="https://www.group-ib.com/blog/apt-lazarus-python-scripts/" target="_blank" rel="noopener">Group-IB</a>, and <a href="https://objective-see.org/blog/blog_0x7D.html" target="_blank" rel="noopener">Objective-See</a>. A parallel investigation was also published by <a href="https://www.zscaler.com/blogs/security-research/pyongyang-your-payroll-rise-north-korean-remote-workers-west" target="_blank" rel="noopener">Zscaler</a>, whose findings we can independently confirm. Our analysis contains details that have not been publicly reported before and presents a comprehensive overview of the malicious activity.</p>
<h4>BeaverTail</h4>
<p>BeaverTail is the name for the infostealer and downloader malware used by DeceptiveDevelopment. There are two different versions &#x2013; one written in JavaScript and placed directly into the trojanized projects with simple obfuscation, and native versions, built using the Qt platform, that are disguised as conferencing software and were initially described by <a href="https://objective-see.org/blog/blog_0x7D.html">Objective-See</a>. Both versions have strong similarities in their functionalities.</p>
<p>This malware targets Windows, Linux, and macOS systems, with the aim of collecting saved login information and cryptocurrency wallet data.</p>
<p>It starts by getting the C&amp;C IP address and port. While the IP addresses vary, the ports used are usually either <span>1224</span> or <span>1244</span>, making the malicious network activity easily identifiable. In the JavaScript version, the IP address and port are obfuscated using base64 encoding, split into three parts, and swapped around to prevent automatic decoding. Other strings are also encoded with base64, often with one dummy character prepended to the resulting string to thwart simple decoding attempts. The native version has the IP, port, and other strings all stored in plaintext. The obfuscated JavaScript code can be seen in Figure 7, and the deobfuscated code in Figure 8.</p>
<figure class="image"><img decoding="async" title="Figure 7. Obfuscated BeaverTail code" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-7.png" alt="Figure 7. Obfuscated BeaverTail code" width="" height=""><figcaption><em>Figure 7. Obfuscated BeaverTail code</em></figcaption></figure>
<figure class="image"><img decoding="async" title="Figure 8. Deobfuscated BeaverTail code" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-8.png" alt="Figure 8. Deobfuscated BeaverTail code" width="" height=""><figcaption><em>Figure 8. Deobfuscated BeaverTail code</em></figcaption></figure>
<p>BeaverTail then looks for browser extensions installed in the Google Chrome, Microsoft Edge, Opera, and Brave browsers and checks whether any of them match extension names from a hardcoded list from Chrome Web Store or Microsoft Edge Add-ons, shown below. The browser listed in parentheses is the source of the extension; note that both Opera and Brave also use extensions from Chrome Web Store, as they are Chromium-based.</p>
<ul>
<li><span>nkbihfbeogaeaoehlefnkodbefgpgknn </span>&#x2013; MetaMask (Chrome)</li>
<li><span>ejbalbakoplchlghecdalmeeeajnimhm</span> &#x2013; MetaMask (Edge)</li>
<li><span>fhbohimaelbohpjbbldcngcnapndodjp</span> &#x2013; BNB Chain Wallet (Chrome)</li>
<li><span>hnfanknocfeofbddgcijnmhnfnkdnaad</span> &#x2013; Coinbase Wallet (Chrome)</li>
<li><span>ibnejdfjmmkpcnlpebklmnkoeoihofec</span> &#x2013; TronLink (Chrome)</li>
<li><span>bfnaelmomeimhlpmgjnjophhpkkoljpa</span> &#x2013; Phantom (Chrome)</li>
<li><span>fnjhmkhhmkbjkkabndcnnogagogbneec</span> &#x2013; Ronin Wallet (Chrome)</li>
<li><span>aeachknmefphepccionboohckonoeemg</span> &#x2013; Coin98 Wallet (Chrome)</li>
<li><span>hifafgmccdpekplomjjkcfgodnhcellj</span> &#x2013; Crypto.com Wallet (Chrome)</li>
</ul>
<p>If they are found, any <span>.ldb</span> and <span>.log</span> files from the extensions&#x2019; directories are collected and exfiltrated.</p>
<p>Apart from these files, the malware also targets a file containing the <a href="https://solana.com/" target="_blank" rel="noopener">Solana</a> keys stored in the user&#x2019;s home directory in <span>.config/solana/id.json</span>. BeaverTail then looks for saved login information in <span>/Library/Keychains/&#x200C;login.keychain</span> (for macOS) or <span>/.local/share/keyrings/</span> (for Linux). If they exist, the Firefox login databases <span>key3.db</span>, <span>key4.db</span>, and <span>logins.json</span> from <span>/.mozilla/firefox/</span> are also exfiltrated during this time.</p>
<p>Each BeaverTail sample contains a victim ID used for identification. These IDs are used throughout the whole compromise chain as identifiers in all downloads and uploads. We suspect that these IDs are unique to each victim and are used to connect the stolen information to the victim&#x2019;s public profile.</p>
<p>The collected data along with the computer hostname and current timestamp is uploaded to the <span>/uploads</span> API endpoint on the C&amp;C server. Then, a standalone Python environment is downloaded in an archive called <span>p2.zip</span>, hosted on the C&amp;C server, to enable execution of the next stage. Finally, the next stage is downloaded from the C&amp;C server (API endpoint <span>/client/&lt;campaign_ID&gt;</span>) into the user&#x2019;s home directory under the name <span>.npl</span> and executed using the downloaded Python environment.</p>
<p>In August 2024, we observed a new version of the JavaScript BeaverTail, where the code placed in the trojanized project acted only as a loader and downloaded and executed the actual payload code from a remote server. This version also used a different obfuscation technique and added four new cryptocurrency wallet extensions to the list of targets:</p>
<ul>
<li><span>jblndlipeogpafnldhgmapagcccfchpi</span> &#x2013; Kaia Wallet (Chrome)</li>
<li><span>acmacodkjbdgmoleebolmdjonilkdbch</span> &#x2013; Rabby Wallet (Chrome)</li>
<li><span>dlcobpjiigpikoobohmabehhmhfoodbb</span> &#x2013; Argent X &#8211; Starknet Wallet (Chrome)</li>
<li><span>aholpfdialjgjfhomihkjbmgjidlcdno</span> &#x2013; Exodus Web3 Wallet (Chrome)</li>
</ul>
<p>When investigating the <span>ipcheck[.]cloud</span> website, we noticed that the homepage is a mirror of the malicious <span>mirotalk[.]net</span> website, serving native BeaverTail malware disguised as remote conferencing software, indicating a direct connection between the new JavaScript and the native versions of BeaverTail.</p>
<h4>InvisibleFerret</h4>
<p>InvisibleFerret is modular Python malware with capabilities for information theft and remote attacker control. It consists of four modules &#x2013; main (the <span>.npl</span> file), payload (<span>pay</span>), browser (<span>bow</span>), and AnyDesk (<span>adc</span>). The malware has no persistence mechanism in place aside from the AnyDesk client deployed at the end of the compromise chain. After gaining persistence via AnyDesk, the attackers can execute InvisibleFerret at will.</p>
<p>Interestingly, most of its backdoor functionality requires an operator (or scripted behavior) at the other side sending commands, deciding what data to exfiltrate and how to propagate the attack. In all versions of InvisibleFerret that we observed, the backdoor components are activated upon operator command. The only functionality not executed by the operator is the initial fingerprinting, which is done automatically.</p>
<h5>Main module</h5>
<p>The main module, originally named <span>main</span>, is the <span>.npl</span> file that BeaverTail downloaded from the C&amp;C server and saved into the home directory. It is responsible for downloading and executing individual payload modules. All modules contain an XOR-encrypted and base64-encoded payload, preceded by four bytes representing the XOR key, followed by code to decrypt and execute it via <span>exec</span>, as seen in Figure 9. Each module also contains the <span>sType</span> variable, containing the current victim ID. This ID is a copy of the ID specified in the download request. When a request is made to download the script file, the given ID is placed as the <span>sType</span> value into the final script file by the C&amp;C server&#x2019;s API.</p>
<figure class="image"><img decoding="async" title="Figure 9. Decrypting and executing the InvisibleFerret payload" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-9.png" alt="Figure 9. Decrypting and executing the InvisibleFerret payload" width="" height=""><figcaption><em>Figure 9. Decrypting and executing the InvisibleFerret payload</em></figcaption></figure>
<p>This module contains a hardcoded C&amp;C address encoded with base64 and split into two halves that have been swapped to make decoding harder. In most cases that we observed, this address was identical to the one used in the preceding BeaverTail sample. The main module downloads the payload module from <span>/payload/&lt;campaign_ID&gt;</span> to <span>.n2/pay</span> in the user&#x2019;s home directory and executes it. Afterwards, if running on macOS (determined by checking whether a call to the <span>platform.system</span> function returns <span>Darwin</span>), it exits. On other operating systems it also downloads the browser module from <span>/brow/&lt;campaign_ID&gt;</span> to <span>.n2/bow</span> in the user&#x2019;s home directory and executes that in a separate Python instance.</p>
<h5>Payload module</h5>
<p>The <span>pay</span> module consists of two parts &#x2013; one collects information and the other serves as a backdoor. The first part contains a hardcoded C&amp;C URL, usually similar to the previously used ones, and collects the following:</p>
<ul>
<li>the user&#x2019;s UUID,</li>
<li>OS type,</li>
<li>PC name,</li>
<li>username,</li>
<li>system version (release),</li>
<li>local IP address, and</li>
<li>public IP address and geolocation information (region name, country, city, ZIP code, ISP, latitude and longitude) parsed from <span>http://ip-api.com/json</span>.</li>
</ul>
<p>This information, illustrated in Figure 10, is then uploaded to the <span>/keys</span> API endpoint using HTTP POST.</p>
<figure class="image"><img decoding="async" title="Figure 10. System information submitted by the payload module to the C&amp;C server" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-10.png" alt="Figure 10. System information submitted by the payload module to the C&amp;C server" width="" height=""><figcaption><em>Figure 10. System information submitted by the payload module to the C&amp;C server</em></figcaption></figure>
<p>The second part acts as a TCP backdoor, and a TCP reverse shell, accepting remote commands from the C&amp;C server and communicating via a socket connection. It usually uses port <span>1245</span>, but we also observed ports <span>80</span>, <span>2245</span>, <span>3001</span>, and <span>5000</span>. Notably, the C&amp;C IP address hardcoded in this part was different from the previous ones sometimes, probably to separate the more suspicious final network activity from the initial deployment.</p>
<p>The second payload checks whether it is executing under Windows &#x2013; if it is, it enables a keylogger implemented using <span>pyWinHook</span> and a clipboard stealer using <span>pyperclip</span>, shown in Figure 11. These collect and store any keypresses and clipboard changes in a global buffer and run in a dedicated thread for as long as the script itself is running.</p>
<figure class="image"><img decoding="async" title="Figure 11. Clipboard stealer and keylogger code" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-11.png" alt="Figure 11. Clipboard stealer and keylogger code" width="" height=""><figcaption><em>Figure 11. Clipboard stealer and keylogger code</em></figcaption></figure>
<p>Afterwards, it executes the backdoor functionality, which consists of eight commands, described in Table 3.</p>
<p><em>Table 3. Commands implemented in InvisibleFerret</em></p>
<table border="1" width="642" cellspacing="0" cellpadding="0">
<thead>
<tr>
<td width="4%"><strong>ID</strong></td>
<td width="15%"><strong>Command</strong></td>
<td width="13%"><strong>Function</strong></td>
<td width="65%"><strong>Description</strong></td>
</tr>
</thead>
<tbody readability="38.5">
<tr readability="2">
<td width="4%">1</td>
<td width="15%"><span>ssh_cmd</span></td>
<td width="13%">Removes the compromise</td>
<td width="65%">&#xB7; Only supports the <span>delete</span> argument.<br />&#xB7; Terminates operation and removes the compromise.</td>
</tr>
<tr readability="3">
<td width="4%">2</td>
<td width="15%"><span>ssh_obj</span></td>
<td width="13%">Executes shell commands</td>
<td width="65%">&#xB7; Executes the given argument[s] using the system shell via Python&#x2019;s <span>subprocess</span> module and returns any output generated by the command.</td>
</tr>
<tr readability="8">
<td width="4%">3</td>
<td width="15%"><span>ssh_clip</span></td>
<td width="13%">Exfiltrates keylogger and clipboard stealer data</td>
<td width="65%">&#xB7; Sends the contents of the keylogger and clipboard stealer buffer to the C&amp;C server and clears the buffer.<br />&#xB7; On operating systems other than Windows, an empty response is sent, as the keylogging functionality is not enabled.</td>
</tr>
<tr readability="6">
<td width="4%">4</td>
<td width="15%"><span>ssh_run</span></td>
<td width="13%">Installs the browser module</td>
<td width="65%">&#xB7; Downloads the browser module to <span>.n2/bow</span> in the user&#x2019;s home directory and executes it in a new Python instance (with the <span>CREATE_NO_WINDOW</span> and <span>CREATE_NEW_PROCESS_GROUP</span> flags set on Windows)<br />&#xB7; Replies to the server with the OS name and <span>get browse</span>.</td>
</tr>
<tr readability="50.5">
<td width="4%">5</td>
<td width="15%"><span>ssh_upload</span></td>
<td width="13%">Exfiltrates files or directories, using FTP</td>
<td width="65%" readability="44">&#xB7; Uploads files to a given FTP server with server address and credentials specified in arguments.<br />&#xB7; Has six subcommands: &#xB7; <span>sdira</span>, <span>sdir</span>, <span>sfile</span>, <span>sfinda</span>, <span>sfindr</span>, and <span>sfind</span>.</p>
<p>&#xB7; <span>sdira</span> &#x2013; uploads everything in a directory specified in <span>args</span>, skipping directories matching the first five elements in the <span>ex_dirs</span> array (listed below). Sends <span>&gt;&gt; upload all start</span>: followed by the directory name to the server when the upload starts, &#x2011;counts: followed by the number of files selected for upload when directory traversal finishes, and <span>uploaded success</span> once everything is uploaded.</p>
<p>&#xB7; <span>sdir</span> &#x2013; similar to <span>sdira</span>, but exfiltrates only files smaller than 104,857,600 bytes (100 MB) with extensions not excluded by <span>ex_files</span> and directories not excluded by <span>ex_dirs</span>. The initial message to the server is <span>&gt;&gt; upload start</span>: followed by the directory name.</p>
<p>&#xB7; <span>sfile</span> &#x2013; similar to <span>sdir</span>, but exfiltrates only a single file. If the extension is <span>.zip</span>, <span>.rar</span>, <span>.pdf</span>, or is in the <span>ex_files</span> list (in this case not being used to exclude files for upload, but from encryption), it gets directly uploaded. Otherwise the file is encrypted using XOR with the hardcoded key <span>G01d*8@(</span> before uploading.</p>
<p>&#xB7; <span>sfinda</span> &#x2013; searches the given directory and all its subdirectories (excluding those in the <span>ex_dirs</span> list) for files matching a provided pattern, and uploads those not matching items in the <span>ex_files</span> list. When starting, sends <span>&gt;&gt; ufind start</span>: followed by the starting directory to the server, followed by <span>ufind</span> success after it finishes.</p>
<p>&#xB7; <span>sfindr</span> &#x2013; similar to <span>sfinda</span>, but without the recursive search. Searches only the specified directory.</p>
<p>&#xB7; <span>sfind</span> &#x2013; similar to <span>sfinda</span>, but starts the search in the current directory.</p>
</td>
</tr>
<tr readability="6">
<td width="4%">6</td>
<td width="15%"><span>ssh_kill</span></td>
<td width="13%">Terminates the Chrome and Brave browsers</td>
<td width="65%">&#xB7; Termination is done via the <span>taskkill</span> command on Windows or <span>killall</span> on other systems, as shown in Figure 12.<br />&#xB7; Replies to the server with <span>Chrome &amp; Browser are terminated</span>.</td>
</tr>
<tr readability="7">
<td width="4%">7</td>
<td width="15%"><span>ssh_any</span></td>
<td width="13%">Installs the AnyDesk module</td>
<td width="65%">&#xB7; This works identically to the <span>ssh_run</span> command, downloading the AnyDesk module to and executing it from the <span>.n2</span> folder in the user&#x2019;s home directory.<br />&#xB7; Replies to the server with the OS name and <span>get anydesk</span>.</td>
</tr>
<tr readability="15">
<td width="4%">8</td>
<td width="15%"><span>ssh_env</span></td>
<td width="13%">Uploads data from the user&#x2019;s home directory and mounted drives, using FTP</td>
<td width="65%">&#xB7; Sends <span>&#8212; uenv start</span> to the server.<br />&#xB7; Establishes an FTP connection using the server address and credentials provided in the arguments.<br />&#xB7; On Windows, uploads the directory structure and contents of the <span>Documents</span> and <span>Downloads</span> folders, as well as the contents of drives <span>D</span> to <span>I</span>.<br />&#xB7; On other systems, uploads the entirety of the user&#x2019;s home directory and the <span>/Volumes</span> directory containing all mounted drives.<br />&#xB7; Only uploads files smaller than 20,971,520 bytes (20 MB) and excludes directories matching the <span>ex_dir</span> list and files matching the <span>ex_files</span>, <span>ex_files1</span>, and <span>ex_files2</span> lists described in Figure 13.<br />&#xB7; Finishes by sending <span>&#8212; uenv success</span> to the server.</td>
</tr>
</tbody>
</table>
<figure class="image"><img decoding="async" title="Figure 12. Implementation of the ssh_kill command" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-12.png" alt="Figure 12. Implementation of the ssh_kill command" width="" height=""><figcaption><em>Figure 12. Implementation of the </em><span>ssh_kill</span><em> command</em></figcaption></figure>
<p>Each command is named with the prefix <span>ssh_</span> and assigned a numerical value to be used when communicating with the server. For each command received, a new thread is spawned to execute it and the client immediately starts listening for the next command. Replies to commands are sent asynchronously as the commands finish executing. The two-way communication is done over sockets, in JSON format, with two fields:</p>
<ul>
<li><span>command</span> &#x2013; denoting the numerical command ID.</li>
<li><span>args</span> &#x2013; containing any additional data sent between the server and client.</li>
</ul>
<p>The script also contains lists of excluded file and directory names (such as cache and temporary directories for software projects and repositories) to be skipped when exfiltrating data, and a list of interesting name patterns to exfiltrate (environment and configuration files; documents, spreadsheets, and other files containing the words secret, wallet, private, password, etc.)</p>
<h4>Browser module</h4>
<p>The <span>bow</span> module is responsible for stealing login data, autofill data, and payment information saved by web browsers. The targeted browsers are Chrome, Brave, Opera, Yandex, and Edge, all Chromium-based, with multiple versions listed for each of the three major operating systems (Windows, Linux, macOS) as shown in Figure 13.</p>
<figure class="image"><img decoding="async" title="Figure 13. Targeted browsers and their versions" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-13.png" alt="Figure 13. Targeted browsers and their versions" width="" height=""><figcaption><em>Figure 13. Targeted browsers and their versions</em></figcaption></figure>
<p>It searches through the browser&#x2019;s local storage folders (an example is shown in Figure 14) and copies the databases containing login and payment information to the <span>%Temp%</span> folder on Windows or the <span>/tmp</span> folder on other systems, into two files:</p>
<ul>
<li><span>LoginData.db</span> containing user login information, and</li>
<li><span>webdata.db</span> containing saved payment information (credit cards).</li>
</ul>
<figure class="image"><img decoding="async" title="Figure 14. Hardcoded local browser paths on Windows" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-14.png" alt="Figure 14. Hardcoded local browser paths on Windows" width="" height=""><figcaption><em>Figure 14. Hardcoded local browser paths on Windows</em></figcaption></figure>
<p>Because the saved passwords and credit card numbers are stored in an encrypted format using AES, they need to be decrypted before exfiltration. The encryption keys used for this are obtained based on the operating system in use. On Windows, they are extracted from the browser&#x2019;s <span>Local&#xA0;State</span> file, on Linux they are obtained through the <a href="https://github.com/mitya57/secretstorage" target="_blank" rel="noopener">secretstorage package</a>, and on macOS they are obtained through the <a href="https://ss64.com/mac/security-password-mgt.html" target="_blank" rel="noopener">security utility</a>, as illustrated in Figure 15.</p>
<figure class="image"><img decoding="async" title="Figure 15. Extracting the encryption keys for browser databases on Windows, Linux, and macOS" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-15.png" alt="Figure 15. Extracting the encryption keys for browser databases on Windows, Linux, and macOS" width="" height=""><figcaption><em>Figure 15. Extracting the encryption keys for browser databases on Windows, Linux, and macOS</em></figcaption></figure>
<p>The collected information (see Figure 16) is then sent to the C&amp;C server via an HTTP POST request to the <span>/keys</span> API endpoint.</p>
<figure class="image"><img decoding="async" title="Figure 16. Information submitted by the browser module to the C&amp;C server" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-16.png" alt="Figure 16. Information submitted by the browser module to the C&amp;C server" width="" height=""><figcaption><em>Figure 16. Information submitted by the browser module to the C&amp;C server</em></figcaption></figure>
<h5>AnyDesk module</h5>
<p>The <span>adc</span> module is the only persistence mechanism found in this compromise chain, setting up AnyDesk access to the victim&#x2019;s computer using a configuration file containing hardcoded login credentials.</p>
<p>On Windows, it checks whether the <span>C:/Program Files (x86)/AnyDesk/AnyDesk.exe</span> exists. If&#xA0;not, it downloads <span>anydesk.exe</span> from the C&amp;C server (<span>http://&lt;C&amp;C_IP&gt;:&lt;C&amp;C_port&gt;/anydesk.exe</span>) into the user&#x2019;s home directory.</p>
<p>Then it attempts to set up AnyDesk for access by the attacker by entering hardcoded password hash, password salt, and token salt values into the configuration files. If the configuration files don&#x2019;t exist or don&#x2019;t contain a given attacker-specified password salt value, the module attempts to modify them to add the hardcoded login information. If that fails, it creates a PowerShell script in the user&#x2019;s home directory named <span>conf.ps1</span>, containing code to modify the configuration files (shown in Figure 17) and attempts to launch it.</p>
<figure class="image"><img decoding="async" title="Figure 17. PowerShell script to modify AnyDesk configuration, adding hardcoded password hash and salt, and token salt" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-17.png" alt="Figure 17. PowerShell script to modify AnyDesk configuration" width="" height=""><figcaption><em>Figure 17. PowerShell script to modify AnyDesk configuration, adding hardcoded password hash and salt, and token salt</em></figcaption></figure>
<p>After these actions complete, the AnyDesk process is killed and then started again to load the new configuration. Lastly, the <span>adc</span> module attempts to delete itself by calling the <a href="https://docs.python.org/3/library/os.html#os.remove" target="_blank" rel="noopener">os.remove function</a> on itself.</p>
<h4>InvisibleFerret update</h4>
<p>We later discovered an updated version of InvisibleFerret with major changes, used since at least August 2024. It is no longer separated into individual modules, but rather exists as a single large script file (but still retaining the backdoor commands to selectively install the browser and AnyDesk modules). There are also slight code modifications for increased support of macOS, for example collecting the username along with the hostname of the computer.</p>
<p>Another modification we observed is the addition of an identifier named <span>gType</span>, in addition to <span>sType</span>. It acts as a secondary victim/campaign identifier in addition to <span>sType</span> when downloading modules from the C&amp;C server (e.g., <span>&lt;C&amp;C_IP&gt;:&lt;port&gt;/&lt;module&gt;/&lt;sType&gt;/&lt;gType&gt;</span>). We haven&#x2019;t seen it used to label the exfiltrated data.</p>
<p>This new version of InvisibleFerret has also implemented an additional backdoor command, <span>ssh_zcp</span>, capable of exfiltrating data from browser extensions and password managers via Telegram and FTP.</p>
<p>With the new command, InvisibleFerret first looks for and, if present, collects data from 88 browser extensions for the Chrome, Brave, and Edge browsers and then places it into a staging folder in the system&#x2019;s temporary directory. The complete list of extensions can be found in the <a href="https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/#Appendix"><em>Appendix</em></a> and the code for collecting the data is shown in Figure 18.</p>
<figure class="image"><img decoding="async" title="Figure 18. Collection of data from browser extensions in the new version of InvisibleFerret" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-18.png" alt="Figure 18. Collection of data from browser extensions in the new version of InvisibleFerret" width="" height=""><figcaption><em>Figure 18. Collection of data from browser extensions in the new version of InvisibleFerret</em></figcaption></figure>
<p>Apart from the extension data, the command can also exfiltrate information from the <span>Atomic</span> and <span>Exodus</span> cryptocurrency wallets on all systems, in addition to <span>1Password</span>, <span>Electrum</span>, <span>WinAuth</span>, <span>Proxifier4</span>, and <span>Dashlane</span> on Windows. This is illustrated in Figure 19.</p>
<figure class="image"><img decoding="async" title="Figure 19. Collection of data from various applications in the new version of InvisibleFerret" src="https://web-assets.esetstatic.com/wls/2025/02-25/deceptivedevelopment/figure-19.png" alt="Figure 19. Collection of data from various applications in the new version of InvisibleFerret" width="" height=""><figcaption><em>Figure 19. Collection of data from various applications in the new version of InvisibleFerret</em></figcaption></figure>
<p>The data is then archived and uploaded to a Telegram chat using the Telegram API with a bot token, as well as to an FTP server. Once the upload is done, InvisibleFerret removes both the staging folder and the archive.</p>
<h4>Clipboard stealer module</h4>
<p>In December 2024 we discovered yet another version of InvisibleFerret, containing an additional module named mlip, downloaded from the C&amp;C endpoint <span>/mclip/&lt;campaign_ID&gt;</span> to <span>.n2/mlip</span>. This module contains the keylogging and clipboard-stealing functionality that was separated from the rest of the payload module.</p>
<p>Showing an advancement in technical capabilities of the operators, the keylogging and clipboard stealing functionality of this module has been limited to two processes only, <span>chrome.exe</span> and <span>brave.exe</span>, while the earlier versions of InvisibleFerret logged any and all keystrokes. The collected data is uploaded to a new API endpoint, <span>/api/clip</span>.</p>
<h3>Network infrastructure</h3>
<p>DeceptiveDevelopment&#x2019;s network infrastructure is composed of dedicated servers hosted by commercial hosting providers, with the three most commonly used providers being RouterHosting (now known as Cloudzy), Stark Industries Solutions, and Pier7ASN. The server API is written in Node.js and consists of nine endpoints, listed in Table 4.</p>
<p><em>Table 4. DeceptiveDevelopment C&amp;C API endpoints</em></p>
<table border="1" width="642" cellspacing="0" cellpadding="0">
<thead>
<tr>
<td width="44%"><strong>API endpoint</strong></td>
<td width="55%"><strong>Description</strong></td>
</tr>
</thead>
<tbody readability="7">
<tr readability="2">
<td width="44%"><span>/pdown</span></td>
<td width="55%">Downloading the Python environment.</td>
</tr>
<tr>
<td width="44%"><span>/uploads</span></td>
<td width="55%">BeaverTail data upload.</td>
</tr>
<tr>
<td width="44%"><span>/client/&lt;campaign_ID&gt;</span></td>
<td width="55%">InvisibleFerret loader.</td>
</tr>
<tr readability="2">
<td width="44%"><span>/payload/&lt;campaign_ID&gt;</span></td>
<td width="55%">InvisibleFerret payload module.</td>
</tr>
<tr readability="2">
<td width="44%"><span>/brow/&lt;campaign_ID&gt;</span></td>
<td width="55%">InvisibleFerret browser module.</td>
</tr>
<tr readability="2">
<td width="44%"><span>/adc/&lt;campaign_ID&gt;</span></td>
<td width="55%">InvisibleFerret AnyDesk module.</td>
</tr>
<tr readability="2">
<td width="44%"><span>/mclip/&lt;campaign_ID&gt;</span></td>
<td width="55%">InvisibleFerret keylogger module.</td>
</tr>
<tr readability="2">
<td width="44%"><span>/keys</span></td>
<td width="55%">InvisibleFerret data upload.</td>
</tr>
<tr readability="2">
<td width="44%"><span>/api/clip</span></td>
<td width="55%">InvisibleFerret keylogger module data upload.</td>
</tr>
</tbody>
</table>
<p>Most C&amp;C communication we observed was done over ports <span>1224</span> or <span>1244</span> (occasionally <span>80</span> or <span>3000</span>) for C&amp;C communication over HTTP, and <span>1245</span> (occasionally <span>80</span>, <span>2245</span>, <span>3001</span>, <span>5000</span>, or <span>5001</span>) for backdoor C&amp;C communication over TCP sockets. All communication from the client to the C&amp;C server, except downloading the Python environment, contains the campaign ID. For InvisibleFerret downloads, the ID is added to the end of the URL in the GET request. For data exfiltration, the ID is sent as part of the POST request in the type field. This is useful for identifying network traffic and determining what specific sample and campaign it belongs to.</p>
<p>The campaign IDs (<span>sType</span> and <span>gType</span> values) we observed are alphanumeric and don&#x2019;t seem to bear any direct relation to the campaign. Before the introduction of <span>gType</span>, some of the <span>sType</span> values were base64 strings containing variants of the word team and numbers, such as <span>5Team9</span> and <span>7tEaM;</span>. After <span>gType</span> was introduced, most observed values for both values were purely numeric, without the use of base64.</p>
<h2>Conclusion</h2>
<p>The DeceptiveDevelopment cluster is an addition to an already large collection of money-making schemes employed by North Korea-aligned actors and conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies. During our research, we observed it go from primitive tools and techniques to more advanced and capable malware, as well as more polished techniques to lure in victims and deploy the malware. Any online job-hunting and freelancing platform can be at risk of being abused for malware distribution by fake recruiters. We continue to observe significant activity related to this campaign and expect DeceptiveDevelopment to continue innovating and searching for more ways to target cryptocurrency users.</p>
<blockquote>
<div><em>For any inquiries about our research published on WeLiveSecurity, please contact us at <a href="m&#97;&#x69;&#x6c;to&#58;&#x74;&#x68;r&#101;&#x61;&#x74;in&#116;&#x65;&#x6c;&#64;&#101;&#x73;&#x65;t.&#99;&#x6f;&#x6d;?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=eset-research&amp;utm_term=en">threati&#110;&#116;&#101;&#108;&#x40;&#x65;&#x73;&#x65;&#x74;&#x2e;&#x63;&#x6f;&#x6d;</a>.&#xA0;</em></div>
<div><em>ESET Research offers private APT intelligence reports and data feeds. For any inquiries about this service, visit the <a href="https://www.eset.com/int/business/services/threat-intelligence/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=deceptivedevelopment-targets-freelance-developers/&amp;sfdccampaignid=7011n0000017htTAAQ" target="_blank" rel="noopener">ESET Threat Intelligence</a> page.</em></div>
</blockquote>
<h2>IoCs</h2>
<p>A comprehensive list of indicators of compromise (IoCs) and samples can be found in <a href="https://github.com/eset/malware-ioc/tree/master/deceptivedevelopment" target="_blank" rel="noopener">our GitHub repository</a>.</p>
<h3>Files</h3>
<table border="1" width="642" cellspacing="0" cellpadding="0">
<thead>
<tr>
<td width="179"><strong>SHA-1</strong></td>
<td width="113"><strong>Filename</strong></td>
<td width="198"><strong>Detection</strong></td>
<td width="151"><strong>Description</strong></td>
</tr>
</thead>
<tbody readability="35">
<tr readability="6">
<td width="179"><span>48E75D6E2BDB2B00ECBF<wbr></wbr>4801A98F96732E397858</span></td>
<td width="113"><span>FCCCall.exe</span></td>
<td width="198">Win64/DeceptiveDevelopment.A</td>
<td width="151">Trojanized conferencing app &#x2013; native BeaverTail.</td>
</tr>
<tr readability="6">
<td width="179"><span>EC8B6A0A7A7407CA3CD1<wbr></wbr>8DE5F93489166996116C</span></td>
<td width="113"><span>pay.py</span></td>
<td width="198">Python/DeceptiveDevelopment.B</td>
<td width="151">InvisibleFerret payload module.</td>
</tr>
<tr readability="6">
<td width="179"><span>3F8EF8649E6B9162CFB0<wbr></wbr>C739F01043A19E9538E7</span></td>
<td width="113"><span>bow.py</span></td>
<td width="198">Python/DeceptiveDevelopment.C</td>
<td width="151">InvisibleFerret browser module.</td>
</tr>
<tr readability="6">
<td width="179"><span>F6517B68F8317504FDCD<wbr></wbr>415653CF46530E19D94A</span></td>
<td width="113"><span>pay_u2GgOA8.py</span></td>
<td width="198">Python/DeceptiveDevelopment.B</td>
<td width="151">InvisibleFerret new payload module.</td>
</tr>
<tr readability="4">
<td width="179"><span>01C0D61BFB4C8269CA56<wbr></wbr>E0F1F666CBF36ABE69AD</span></td>
<td width="113"><span>setupTest.js</span></td>
<td width="198">JS/Spy.DeceptiveDevelopment.A</td>
<td width="151">BeaverTail.</td>
</tr>
<tr readability="4">
<td width="179"><span>2E3E1B95E22E4A8F4C75<wbr></wbr>334BA5FC30D6A54C34C1</span></td>
<td width="113"><span>tailwind.config<wbr></wbr>.js</span></td>
<td width="198">JS/Spy.DeceptiveDevelopment.A</td>
<td width="151">BeaverTail.</td>
</tr>
<tr readability="6">
<td width="179"><span>7C8724B75BF7A9B8F27F<wbr></wbr>5E86AAC9445AAFCCB6AC</span></td>
<td width="113"><span>conf.ps1</span></td>
<td width="198">PowerShell/DeceptiveDevelopment.A</td>
<td width="151">AnyDesk configuration PowerShell script.</td>
</tr>
<tr readability="6">
<td width="179"><span>5F5D3A86437082FA512B<wbr></wbr>5C93A6B4E39397E1ADC8</span></td>
<td width="113"><span>adc.py</span></td>
<td width="198">Python/DeceptiveDevelopment.A</td>
<td width="151">InvisibleFerret AnyDesk module.</td>
</tr>
<tr readability="6">
<td width="179"><span>7C5B2CAFAEABBCEB9765<wbr></wbr>D20C6A323A07FA928624</span></td>
<td width="113"><span>bow.py</span></td>
<td width="198">Python/DeceptiveDevelopment.A</td>
<td width="151">InvisibleFerret browser module.</td>
</tr>
<tr readability="6">
<td width="179"><span>BA1A54F4FFA42765232B<wbr></wbr>A094AAAFAEE5D3BB2B8C</span></td>
<td width="113"><span>pay.py</span></td>
<td width="198">Python/DeceptiveDevelopment.A</td>
<td width="151">InvisibleFerret payload module.</td>
</tr>
<tr readability="6">
<td width="179"><span>6F049D8A0723DF10144C<wbr></wbr>B51A43CE15147634FAFE</span></td>
<td width="113"><span>.npl</span></td>
<td width="198">Python/DeceptiveDevelopment.A</td>
<td width="151">InvisibleFerret loader module.</td>
</tr>
<tr readability="4">
<td width="179"><span>8FECA3F5143D15437025<wbr></wbr>777285D8E2E3AA9D6CAA</span></td>
<td width="113"><span>admin.model.js</span></td>
<td width="198">JS/Spy.DeceptiveDevelopment.A</td>
<td width="151">BeaverTail.</td>
</tr>
<tr readability="4">
<td width="179"><span>380BD7EDA453487CF115<wbr></wbr>09D548EF5E5A666ACD95</span></td>
<td width="113"><span>run.js</span></td>
<td width="198">JS/Spy.DeceptiveDevelopment.A</td>
<td width="151">BeaverTail.</td>
</tr>
</tbody>
</table>
<h3>Network</h3>
<table border="1" width="642" cellspacing="0" cellpadding="0">
<thead>
<tr>
<td width="151"><strong>IP</strong></td>
<td width="76"><strong>Domain</strong></td>
<td width="132"><strong>Hosting provider</strong></td>
<td width="94"><strong>First seen</strong></td>
<td width="189"><strong>Details</strong></td>
</tr>
</thead>
<tbody readability="14">
<tr readability="4">
<td width="151"><span>95.164.17[.]24</span></td>
<td width="76">N/A</td>
<td width="132">STARK INDUSTRIES SOLUTIONS LTD</td>
<td width="94">2024&#x2011;06&#x2011;06</td>
<td width="189">BeaverTail/InvisibleFerret C&amp;C and staging server.</td>
</tr>
<tr readability="4">
<td width="151"><span>185.235.241[.]208</span></td>
<td width="76">N/A</td>
<td width="132">STARK INDUSTRIES SOLUTIONS LTD</td>
<td width="94">2021&#x2011;04&#x2011;12</td>
<td width="189">BeaverTail/InvisibleFerret C&amp;C and staging server.</td>
</tr>
<tr readability="5">
<td width="151"><span>147.124.214[.]129</span></td>
<td width="76">N/A</td>
<td width="132">Majestic Hosting Solutions, LLC</td>
<td width="94">2024&#x2011;03&#x2011;22</td>
<td width="189">BeaverTail/InvisibleFerret C&amp;C and staging server.</td>
</tr>
<tr readability="4">
<td width="151"><span>23.106.253[.]194</span></td>
<td width="76">N/A</td>
<td width="132">LEASEWEB SINGAPORE PTE. LTD.</td>
<td width="94">2024&#x2011;05&#x2011;28</td>
<td width="189">BeaverTail/InvisibleFerret C&amp;C and staging server.</td>
</tr>
<tr readability="5">
<td width="151"><span>147.124.214[.]237</span></td>
<td width="76">N/A</td>
<td width="132">Majestic Hosting Solutions, LLC</td>
<td width="94">2023&#x2011;01&#x2011;28</td>
<td width="189">BeaverTail/InvisibleFerret C&amp;C and staging server.</td>
</tr>
<tr readability="2">
<td width="151"><span>67.203.7[.]171</span></td>
<td width="76">N/A</td>
<td width="132">Amaze Internet Services</td>
<td width="94">2024&#x2011;02&#x2011;14</td>
<td width="189">BeaverTail/InvisibleFerret C&amp;C and staging server.</td>
</tr>
<tr readability="2">
<td width="151"><span>45.61.131[.]218</span></td>
<td width="76">N/A</td>
<td width="132">RouterHosting LLC</td>
<td width="94">2024&#x2011;01&#x2011;22</td>
<td width="189">BeaverTail/InvisibleFerret C&amp;C and staging server.</td>
</tr>
<tr readability="2">
<td width="151"><span>135.125.248[.]56</span></td>
<td width="76">N/A</td>
<td width="132">OVH SAS</td>
<td width="94">2023&#x2011;06&#x2011;30</td>
<td width="189">BeaverTail/InvisibleFerret C&amp;C and staging server.</td>
</tr>
</tbody>
</table>
<h2>MITRE ATT&amp;CK techniques</h2>
<p>This table was built using <a href="https://attack.mitre.org/resources/versions/">version 16</a> of the MITRE ATT&amp;CK framework<strong>.</strong></p>
<table border="1" width="642" cellspacing="0" cellpadding="0">
<thead>
<tr>
<td width="113"><strong>Tactic</strong></td>
<td width="113"><strong>ID</strong></td>
<td width="151"><strong>Name</strong></td>
<td width="265"><strong>Description</strong></td>
</tr>
</thead>
<tbody readability="76.397905759162">
<tr readability="3.75">
<td rowspan="4" width="113"><strong>Resource Development</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1583/003">T1583.003</a></td>
<td width="151">Acquire Infrastructure: Virtual Private Server</td>
<td width="265">The attackers rent out infrastructure for C&amp;C and staging servers.</td>
</tr>
<tr readability="3.6571428571429">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1587/001">T1587.001</a></td>
<td width="151">Develop Capabilities: Malware</td>
<td width="265">The attackers develop the BeaverTail and InvisibleFerret malware.</td>
</tr>
<tr readability="4.6511627906977">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1585/001">T1585.001</a></td>
<td width="151">Establish Accounts: Social Media Accounts</td>
<td width="265">The attackers create fake social media accounts, pretending to be recruiters.</td>
</tr>
<tr readability="5.6516129032258">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1608/001">T1608.001</a></td>
<td width="151">Stage Capabilities: Upload Malware</td>
<td width="265">InvisibleFerret modules are uploaded to staging servers, from where they are downloaded to victimized systems.</td>
</tr>
<tr readability="3.6923076923077">
<td width="113"><strong>Initial Access</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1566/003">T1566.003</a></td>
<td width="151">Phishing: Spearphishing via Service</td>
<td width="265">Spearphishing via job-hunting and freelancing platforms.</td>
</tr>
<tr readability="3.5909090909091">
<td rowspan="4" width="113"><strong>Execution</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1059/006">T1059.006</a></td>
<td width="151">Command-Line Interface: Python</td>
<td width="265">InvisibleFerret is written in Python.</td>
</tr>
<tr readability="3.64">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1059/007">T1059.007</a></td>
<td width="151">Command-Line Interface: JavaScript/JScript</td>
<td width="265">BeaverTail has a variant written in JavaScript.</td>
</tr>
<tr readability="4.7039473684211">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1204/002">T1204.002</a></td>
<td width="151">User Execution: Malicious File</td>
<td width="265">Initial compromise is triggered by the victim executing a trojanized project containing the BeaverTail malware.</td>
</tr>
<tr readability="3.7534246575342">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1059/003">T1059.003</a></td>
<td width="151">Command-Line Interface: Windows Command Shell</td>
<td width="265">InvisibleFerret&#x2019;s remote shell functionality allows access to the Windows Command Shell.</td>
</tr>
<tr readability="1.921875">
<td width="113"><strong>Persistence</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1133">T1133</a></td>
<td width="151">External Remote Services</td>
<td width="265">Persistence is achieved by installing and configuring the AnyDesk remote access tool.</td>
</tr>
<tr readability="4.8743718592965">
<td rowspan="4" width="113"><strong>Defense Evasion</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1140">T1140</a></td>
<td width="151">Deobfuscate/Decode Files or Information</td>
<td width="265">The JavaScript variant of BeaverTail uses code obfuscation. C&amp;C server addresses and other configuration data are also encrypted/encoded.</td>
</tr>
<tr readability="3.7073170731707">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1564/001">T1564.001</a></td>
<td width="151">Hide Artifacts: Hidden Files and Directories</td>
<td width="265">InvisibleFerret files are dropped to disk with the hidden attribute.</td>
</tr>
<tr readability="3.6538461538462">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1564/003">T1564.003</a></td>
<td width="151">Hide Artifacts: Hidden Window</td>
<td width="265">InvisibleFerret creates new processes with their windows hidden.</td>
</tr>
<tr readability="3.7551020408163">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1027/013">T1027.013</a></td>
<td width="151">Obfuscated Files or Information: Encrypted/Encoded File</td>
<td width="265">InvisibleFerret payloads are encrypted and have to be decrypted before execution.</td>
</tr>
<tr readability="3.7410071942446">
<td rowspan="3" width="113"><strong>Credential Access</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1555/001">T1555.001</a></td>
<td width="151">Credentials from Password Stores: Keychain</td>
<td width="265">Keychain data is exfiltrated by both BeaverTail and InvisibleFerret.</td>
</tr>
<tr readability="3.75">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1555/003">T1555.003</a></td>
<td width="151">Credentials from Password Stores: Credentials from Web Browsers</td>
<td width="265">Credentials stored in web browsers are exfiltrated by InvisibleFerret.</td>
</tr>
<tr readability="3.7647058823529">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1552/001">T1552.001</a></td>
<td width="151">Unsecured Credentials: Credentials In Files</td>
<td width="265">Plaintext credentials/keys in certain files are exfiltrated by both BeaverTail and InvisibleFerret.</td>
</tr>
<tr readability="3.8387096774194">
<td rowspan="7" width="113"><strong>Discovery</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1010">T1010</a></td>
<td width="151">Application Window Discovery</td>
<td width="265">The InvisibleFerret keylogger collects the name of the currently active window.</td>
</tr>
<tr readability="3.8245614035088">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1217">T1217</a></td>
<td width="151">Browser Bookmark Discovery</td>
<td width="265">Credentials and other data stored by browsers are exfiltrated by InvisibleFerret.</td>
</tr>
<tr readability="3.8198198198198">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1083">T1083</a></td>
<td width="151">File and Directory Discovery</td>
<td width="265">The InvisibleFerret backdoor can browse the filesystem and exfiltrate files.</td>
</tr>
<tr readability="3.811320754717">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1082">T1082</a></td>
<td width="151">System Information Discovery</td>
<td width="265">System information is collected by both BeaverTail and InvisibleFerret.</td>
</tr>
<tr readability="3.8148148148148">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1614">T1614</a></td>
<td width="151">System Location Discovery</td>
<td width="265">InvisibleFerret geolocates the campaign by querying the IP address location.</td>
</tr>
<tr readability="4.8091603053435">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1016">T1016</a></td>
<td width="151">System Network Configuration Discovery</td>
<td width="265">InvisibleFerret collects network information, such as private and public IP addresses.</td>
</tr>
<tr readability="1.8550724637681">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1124">T1124</a></td>
<td width="151">System Time Discovery</td>
<td width="265">InvisibleFerret collects the system time.</td>
</tr>
<tr readability="3.7735849056604">
<td width="113"><strong>Lateral Movement</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1021/001">T1021.001</a></td>
<td width="151">Remote Services: Remote Desktop Protocol</td>
<td width="265">AnyDesk is used by InvisibleFerret to achieve persistence and allow remote attacker access.</td>
</tr>
<tr readability="3.625">
<td rowspan="7" width="113"><strong>Collection</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1056/001">T1056.001</a></td>
<td width="151">Input Capture: Keylogging</td>
<td width="265">InvisibleFerret contains keylogger functionality.</td>
</tr>
<tr readability="4.7077922077922">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1560/002">T1560.002</a></td>
<td width="151">Archive Collected Data: Archive via Library</td>
<td width="265">Data exfiltrated using InvisibleFerret can be archived using the <span>py7zr</span> and <span>pyzipper</span> Python packages.</td>
</tr>
<tr readability="1.8979591836735">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1119">T1119</a></td>
<td width="151">Automated Collection</td>
<td width="265">Both BeaverTail and InvisibleFerret exfiltrate some data automatically.</td>
</tr>
<tr readability="1.9029126213592">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1005">T1005</a></td>
<td width="151">Data from Local System</td>
<td width="265">Both BeaverTail and InvisibleFerret exfiltrate data from the local system.</td>
</tr>
<tr readability="3.7872340425532">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1025">T1025</a></td>
<td width="151">Data from Removable Media</td>
<td width="265">InvisibleFerret scans removable media for files to exfiltrate.</td>
</tr>
<tr readability="5.7589285714286">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1074/001">T1074.001</a></td>
<td width="151">Data Staged: Local Data Staging</td>
<td width="265">InvisibleFerret copies browser databases to the temp folder prior to credential extraction. When exfiltrating via a ZIP/7z archive, the file is created locally before being uploaded.</td>
</tr>
<tr readability="1.8717948717949">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1115">T1115</a></td>
<td width="151">Clipboard Data</td>
<td width="265">InvisibleFerret contains clipboard stealer functionality.</td>
</tr>
<tr readability="3.6923076923077">
<td rowspan="5" width="113"><strong>Command and Control</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1071/001">T1071.001</a></td>
<td width="151">Standard Application Layer Protocol: Web Protocols</td>
<td width="265">C&amp;C communication is done over HTTP.</td>
</tr>
<tr readability="3.702479338843">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1071/002">T1071.002</a></td>
<td width="151">Standard Application Layer Protocol: File Transfer Protocols</td>
<td width="265">Files are exfiltrated over FTP by InvisibleFerret.</td>
</tr>
<tr readability="3.811320754717">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1571">T1571</a></td>
<td width="151">Non-Standard Port</td>
<td width="265">Nonstandard ports <span>1224</span>, <span>1244</span>, and <span>1245</span> are used by BeaverTail and InvisibleFerret.</td>
</tr>
<tr readability="1.8876404494382">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1219">T1219</a></td>
<td width="151">Remote Access Tools</td>
<td width="265">InvisibleFerret can install AnyDesk as a persistence mechanism.</td>
</tr>
<tr readability="3.7701149425287">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1095">T1095</a></td>
<td width="151">Non-Application Layer Protocol</td>
<td width="265">TCP is used for command and control communication.</td>
</tr>
<tr readability="4.8">
<td rowspan="3" width="113"><strong>Exfiltration</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1030">T1030</a></td>
<td width="151">Data Transfer Size Limits</td>
<td width="265">In some cases, InvisibleFerret exfiltrates only files below a certain file size.</td>
</tr>
<tr readability="3.8095238095238">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1041">T1041</a></td>
<td width="151">Exfiltration Over Command and Control Channel</td>
<td width="265">Some data is exfiltrated to the C&amp;C server over HTTP.</td>
</tr>
<tr readability="4.7305389221557">
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1567/004">T1567.004</a></td>
<td width="151">Exfiltration Over Web Service: Exfiltration Over Webhook</td>
<td width="265">Exfiltrating ZIP/7z files can be done over a Telegram webhook (InvisibleFerret&#x2019;s <span>ssh_zcp</span> command).</td>
</tr>
<tr readability="2.9050632911392">
<td width="113"><strong>Impact</strong></td>
<td width="113"><a href="https://attack.mitre.org/versions/v16/techniques/T1657">T1657</a></td>
<td width="151">Financial Theft</td>
<td width="265">This campaign&#x2019;s goal is cryptocurrency theft and InvisibleFerret has also been seen exfiltrating saved credit card information.</td>
</tr>
</tbody>
</table>
<h2>Appendix</h2>
<p>Following is a list of browser extensions targeted by the new InvisibleFerret:</p>
<table border="1">
<tbody readability="5">
<tr readability="10">
<td>ArgentX<br />Aurox<br />Backpack<br />Binance<br />Bitget<br />Blade<br />Block<br />Braavos<br />ByBit<br />Casper<br />Cirus<br />Coin98<br />CoinBase<br />Compass-Sei<br />Core-Crypto<br />Cosmostation<br />Crypto.com<br />Dashalane<br />Enkrypt<br />Eternl<br />Exodus<br />Fewcha-Move<br />Fluent<br />Frontier<br />GoogleAuth<br />Hashpack<br />HAVAH<br />HBAR<br />Initia<br />Keplr</td>
<td>Koala<br />LastPass<br />LeapCosmos<br />Leather<br />Libonomy<br />MagicEden<br />Manta<br />Martian<br />Math<br />MetaMask<br />MetaMask-Edge<br />MOBOX<br />Moso<br />MyTon<br />Nami<br />OKX<br />OneKey<br />OpenMask<br />Orange<br />OrdPay<br />OsmWallet<br />Paragon<br />PetraAptos<br />Phantom<br />Pontem<br />Rabby<br />Rainbow<br />Ramper<br />Rise<br />Ronin</td>
<td>Safepal<br />Sender<br />SenSui<br />Shell<br />Solflare<br />Stargazer<br />Station<br />Sub-Polkadot<br />Sui<br />Suiet<br />Suku<br />Taho<br />Talisman<br />Termux<br />Tomo<br />Ton<br />Tonkeeper<br />TronLink<br />Trust<br />Twetch<br />UniSat<br />Virgo<br />Wigwam<br />Wombat<br />XDEFI<br />Xverse<br />Zapit<br />Zerion<br />&#xA0;</td>
</tr>
</tbody>
</table>
<p><a href="https://www.eset.com/int/business/services/threat-intelligence/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=deceptivedevelopment-targets-freelance-developers&amp;sfdccampaignid=7011n0000017htTAAQ" target="_blank" rel="noopener"><img fetchpriority="high" decoding="async" src="https://web-assets.esetstatic.com/wls/2023/2023-12/welivesecurity-eset-threat-intelligence.jpeg" alt="" width="915" height="296"></a></p>
<p>The post <a href="https://onlinepitstop.com/2025/02/23/deceptivedevelopment-targets-freelance-developers/">DeceptiveDevelopment targets freelance developers</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/23/deceptivedevelopment-targets-freelance-developers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake job offers target software developers with infostealers</title>
		<link>https://onlinepitstop.com/2025/02/22/fake-job-offers-target-software-developers-with-infostealers/</link>
					<comments>https://onlinepitstop.com/2025/02/22/fake-job-offers-target-software-developers-with-infostealers/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 22 Feb 2025 00:33:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/22/fake-job-offers-target-software-developers-with-infostealers/</guid>

					<description><![CDATA[<p>A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims&#8217; crypto wallets and steals their login details from web browsers and password managers 20 Feb 2025 ESET researchers have observed a malicious campaign where North Korea-aligned threat actors, posing as headhunters, target freelance software developers with info-stealing malware. The activities &#x2013; named DeceptiveDevelopment</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/22/fake-job-offers-target-software-developers-with-infostealers/">Fake job offers target software developers with infostealers</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="32.255639097744">
<p class="sub-title">A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims&#8217; crypto wallets and steals their login details from web browsers and password managers</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/editor/" title="Editor"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" alt="Editor"></picture></a></div>
</div>
<p class="article-info mb-5">
        <span>20 Feb 2025</span>
    </p>
</div>
<div readability="46.048298572997">
<p>ESET researchers have observed a malicious campaign where North Korea-aligned threat actors, posing as headhunters, target freelance software developers with info-stealing malware.</p>
<p>The activities &#x2013; named <a href="https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/" target="_blank" rel="noopener">DeceptiveDevelopment</a> and going back to at least November 2023 &#x2013; involve spearphishing messages that are being distributed on job-hunting and freelancing sites and ask the targets to take a coding test, with the files necessary for the task usually hosted on private repositories such as GitHub. These files are laden with malware, however, which ultimately lets the attackers steal the victims&#8217; login details and drain their cryptocurrency wallets.</p>
<p>What else is there to know about the campaign&#8217;s tactics, techniques, and procedures? Learn from ESET Chief Security Evangelist <a href="https://www.welivesecurity.com/en/our-experts/tony-anscombe/" target="_blank" rel="noopener">Tony Anscombe</a> in the video and make sure to read the <a href="https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/" target="_blank" rel="noopener">full blogpost</a>.</p>
<blockquote readability="3.9152542372881">
<p>Connect with us on&#xA0;<a href="https://www.facebook.com/eset">Facebook</a>, <a href="https://x.com/ESET" target="_blank" rel="noopener">X</a>,&#xA0;<a href="https://www.linkedin.com/company/eset/">LinkedIn</a>&#xA0;and&#xA0;<a href="https://www.instagram.com/eset/">Instagram</a>.</p>
</blockquote>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/22/fake-job-offers-target-software-developers-with-infostealers/">Fake job offers target software developers with infostealers</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/22/fake-job-offers-target-software-developers-with-infostealers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>No, you’re not fired – but beware of job termination scams</title>
		<link>https://onlinepitstop.com/2025/02/21/no-youre-not-fired-but-beware-of-job-termination-scams/</link>
					<comments>https://onlinepitstop.com/2025/02/21/no-youre-not-fired-but-beware-of-job-termination-scams/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 21 Feb 2025 00:24:47 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/21/no-youre-not-fired-but-beware-of-job-termination-scams/</guid>

					<description><![CDATA[<p>Some employment scams take an unexpected turn as cybercriminals shift from &#x201C;hiring&#x201D; to &#x201C;firing&#x201D; staff Phil Muncaster 18 Feb 2025 &#xA0;&#x2022;&#xA0; , 5 min. read Most of us are in a job or looking for one. Or both. That&#x2019;s largely why employment and work-from-home scams are so popular among cybercriminals (and even some state-aligned threat</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/21/no-youre-not-fired-but-beware-of-job-termination-scams/">No, you’re not fired – but beware of job termination scams</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33.779735682819">
<p class="sub-title">Some employment scams take an unexpected turn as cybercriminals shift from &#x201C;hiring&#x201D; to &#x201C;firing&#x201D; staff</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2021/04/Phil_Muncaster.jpg" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2021/04/Phil_Muncaster.jpg" alt="Phil Muncaster"></picture></a></p>
<div class="author-text">
<p><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><b>Phil Muncaster</b></a></p>
</div>
</div>
</div>
<p class="article-info mb-5">
        <span>18 Feb 2025</span><br />
        <span class="d-none d-lg-inline">&#xA0;&#x2022;&#xA0;</span><br />
        <span class="d-inline d-lg-none">, </span><br />
        <span>5 min. read</span>
    </p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2025/02-25/job-termination-fraud.jpeg" media="(max-width: 768px)"></source><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2025/02-25/job-termination-fraud.jpeg" media="(max-width: 1120px)"></source><img decoding="async" class="hero-image" src="https://web-assets.esetstatic.com/tn/-x700/wls/2025/02-25/job-termination-fraud.jpeg" alt="No, you&#x2019;re not fired &#x2013; but beware of job termination scams"></picture>    </div>
</div>
<div readability="86.20039748261">
<p>Most of us are in a job or looking for one. Or both. That&#x2019;s largely why<a href="https://www.welivesecurity.com/en/scams/the-job-hunters-guide-separating-genuine-offers-from-scams/" target="_blank" rel="noopener"> employment</a> and <a href="https://www.welivesecurity.com/en/scams/8-common-work-from-home-scams-to-avoid/" target="_blank" rel="noopener">work-from-home</a> scams are so popular among cybercriminals (and even some <a href="https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/" target="_blank" rel="noopener">state-aligned</a> threat <a href="https://www.welivesecurity.com/en/eset-research/lazarus-luring-employees-trojanized-coding-challenges-case-spanish-aerospace-company/" target="_blank" rel="noopener">actors</a>). The schemes typically lure the user by offering amazing job or casual employment opportunities. But in reality, all the scammers usually want is your personal and financial information. In some cases, victims may even end up unwittingly receiving and re-shipping stolen goods, or allowing their bank accounts to be <a href="https://www.welivesecurity.com/2023/05/30/tricks-trade-cybercrime-ring-fraud-scheme/">used for money laundering</a>.</p>
<p>However, less-well known is the employment termination scam. This turns the idea on its head: using the threat of losing your job rather than the lure of gaining a new one to catch your attention. So what do they look like and how can you stay safe?</p>
<h2>What do job termination scams look like?</h2>
<p>At their simplest, job termination scams are a type of phishing attack designed to trick you into handing over your personal and financial information, or on clicking on a malicious link which could trigger a malware download. Social engineering tactics used in phishing aim to create a sense of urgency in the victim, so that they act without thinking things through first. And you can&#x2019;t get more urgent than a notice informing you that you have been dismissed.</p>
<p>It could arrive in the form of an email from HR, or an authoritative third-party outside the company. It may tell you that your services are no longer required. Or it may claim to <a href="https://www.pcrisk.com/removal-guides/31446-staff-whose-employment-have-been-terminated-email-scam" target="_blank" rel="noopener">include details about your colleagues</a> that are too hard to resist reading. The end goal is to persuade you to click on a malicious link or open an attachment, perhaps by claiming that it includes details of severance payments and termination dates.</p>
<p>Once you click through/open the attachment, you might find that:</p>
<p>With your work logins, adversaries could hijack your email or other accounts to access sensitive corporate data and networks for theft and extortion. And if you reuse those logins across multiple accounts, they may even be able to run credential stuffing campaigns to unlock those accounts, too.</p>
<p><a href="https://www.esetworld.com/" target="_blank" rel="noopener"><img decoding="async" src="https://web-assets.esetstatic.com/wls/2025/02-25/eset-world-2025.png" alt="" width="" height=""></a></p>
<h2>Why do they work so well?</h2>
<p>Termination scams are effective because they <a href="https://www.welivesecurity.com/2022/05/12/10-reasons-why-we-fall-scams/" target="_blank" rel="noopener">exploit the credulity of human beings</a>, creating a sense of dread among the victim, and instilling an urgent need for action. You&#x2019;d be hard pressed to find an employee that didn&#x2019;t want to know more about their own termination, or potentially contrived details of supposed misconduct.</p>
<p>It&#x2019;s no coincidence that phishing remains a <a href="https://www.coveware.com/blog/2024/7/29/ransomware-actors-pivot-away-from-major-brands-in-q2-2024" target="_blank" rel="noopener">top-three initial access tactic</a> for ransomware actors and <a href="https://www.verizon.com/about/news/2024-data-breach-investigations-report-emea" target="_blank" rel="noopener">has contributed to a quarter</a> (25%) of financially motivated cyber-incidents over the past two years.</p>
<h2>In the wild</h2>
<p>Several versions of this scam have been observed circulating in the wild. These include:</p>
<ul>
<li>An <a href="https://www.cloudflare.com/es-la/threat-intelligence/research/report/sacked-or-hacked-unmasking-employment-termination-scams/" target="_blank" rel="noopener">email impersonating</a> the UK&#x2019;s Courts &amp; Tribunals Service, purporting to contain a link to an employment termination document. Clicking through loads a spoofed website with the Microsoft logo designed to persuade the victim into opening it on a Windows device. It triggers a download of the <a href="https://www.welivesecurity.com/2019/10/03/casbaneiro-trojan-dangerous-cooking/" target="_blank" rel="noopener">Casbaneiro</a> (aka Metamorfo) banking trojan.</li>
<li>An email <a href="https://www.pcrisk.com/removal-guides/31446-staff-whose-employment-have-been-terminated-email-scam" target="_blank" rel="noopener">purporting to come</a> from the victim&#x2019;s HR department, which claims to contain a staff termination list and details on new positions, as an attachment. Opening the fake PDF triggers a fake DocuSign login form requesting the victim enters their email address and password to access it.</li>
</ul>
<figure class="image"><img decoding="async" title="Source: PCrisk" src="https://web-assets.esetstatic.com/wls/2025/02-25/job-termination-scam.jpeg" alt="job termination scam" width="602" height="458"><figcaption><em>Source: <a href="https://www.pcrisk.com/removal-guides/31446-staff-whose-employment-have-been-terminated-email-scam" target="_blank" rel="noopener">PCrisk</a></em></figcaption></figure>
<h2>How to spot a job termination scam</h2>
<p>As with any phishing attack, there are a few warning signs which should flash red if such an email ends up in your inbox. Take a deep breath and look out for giveaways such as:</p>
<ul>
<li>An unusual sender address that doesn&#x2019;t match the stated sender. Hover your mouse over the &#x201C;from&#x201D; address to see what pops up. It may be something completely different, or it could be an attempt to mimic the impersonated company&#x2019;s domain, using typos and other characters (e.g., m1crosoft.com, @microsfot.com)</li>
<li>A generic greeting (e.g., &#x201C;dear employee/user&#x201D;), which is certainly not the tone a legitimate termination letter would take.</li>
<li>Links embedded in the email or attachments to open. These are often a tell-tale sign of a phishing attempt. If you hover over the link and it doesn&#x2019;t look right, all the more reason not to click.</li>
<li>Links or attachments that don&#x2019;t open immediately, but request you to enter logins. Never do so in response to an unsolicited message.</li>
<li>Urgent language. Phishing messages will always try to rush you into making a rash decision.</li>
<li>Misspellings, grammatical or other mistakes in the letter. These are becoming rarer as cybercriminals <a href="https://www.welivesecurity.com/2023/02/22/chatgpt-level-up-phishing-defenses/">adopt generative AI tools</a> to write their phishing emails, but they&#x2019;re still worth looking out for.</li>
<li>Going forward, be on your guard for <a href="https://www.welivesecurity.com/en/cybersecurity/ai-driven-identify-fraud-havoc/">AI-aided schemes</a> where scammers could use deepfake <a href="https://www.welivesecurity.com/en/cybercrime/the-grand-theft-of-jake-moores-voice-the-concept-of-a-virtual-kidnap/">audio</a> and video likenesses of actual people (that of your boss, perhaps) to trick you into giving up confidential corporate information.</li>
</ul>
<h2>Staying safe</h2>
<p>To ensure you don&#x2019;t get caught out by job termination scams, understand the warning signs listed above. And also consider the following:</p>
<ul>
<li>Use <a href="https://www.welivesecurity.com/2023/01/02/most-common-passwords-what-do-if-yours-list/">strong, unique passwords</a> for every account, ideally stored in a <a href="https://www.welivesecurity.com/2023/04/11/10-things-look-buying-password-manager/">password manager</a></li>
<li>Be sure to switch on <a href="https://www.welivesecurity.com/2019/12/13/2fa-double-down-your-security/" target="_blank" rel="noopener">two-factor authentication</a> (2FA) for an extra layer of access security</li>
<li>Make sure all of your work and personal devices are regularly <a href="https://www.welivesecurity.com/2022/10/24/5-reasons-keep-software-devices-up-to-date/">patched and up to date</a></li>
<li>If your IT department offers, join regular <a href="https://www.welivesecurity.com/2022/06/21/phishing-awareness-training-help-employees-avoid-hook/" target="_blank" rel="noopener">phishing simulation exercises</a> to understand what to look out for</li>
<li>If you <a href="https://www.welivesecurity.com/en/scams/dear-all-what-are-some-common-subject-lines-in-phishing-emails/">receive a suspect message</a>, never click on embedded links or open the attachment</li>
<li>Contact the sender through other channels if you&#x2019;re concerned &#x2013; but not by replying to the email or using the contact details listed on it</li>
<li>Report any suspect emails to your employer&#x2019;s IT department</li>
<li>Check whether colleagues have received the same message</li>
</ul>
<p>Employment termination scams have been <a href="https://wyatthitechlaw.com/2020/08/13/scammers-target-remote-workers-with-email-phishing-campaigns/">around for some time</a>. But if they&#x2019;re still doing the rounds, they must still be working. Always be sceptical of anything hitting your inbox.</p>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/21/no-youre-not-fired-but-beware-of-job-termination-scams/">No, you’re not fired – but beware of job termination scams</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/21/no-youre-not-fired-but-beware-of-job-termination-scams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is penetration testing? &#124; Unlocked 403 cybersecurity podcast (ep. 10)</title>
		<link>https://onlinepitstop.com/2025/02/20/what-is-penetration-testing-unlocked-403-cybersecurity-podcast-ep-10/</link>
					<comments>https://onlinepitstop.com/2025/02/20/what-is-penetration-testing-unlocked-403-cybersecurity-podcast-ep-10/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 20 Feb 2025 00:23:39 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/20/what-is-penetration-testing-unlocked-403-cybersecurity-podcast-ep-10/</guid>

					<description><![CDATA[<p>Ever wondered what it&#8217;s like to hack for a living &#x2013; legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security. 12 Feb 2025 What if breaking into computer systems, tricking people into handing over passwords, and even sneaking into buildings was part of your</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/20/what-is-penetration-testing-unlocked-403-cybersecurity-podcast-ep-10/">What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="32.302816901408">
<p class="sub-title">Ever wondered what it&#8217;s like to hack for a living &#x2013; legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/editor/" title="Editor"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" alt="Editor"></picture></a></div>
</div>
<p class="article-info mb-5">
        <span>12 Feb 2025</span>
    </p>
</div>
<div readability="48.809523809524">
<p>What if breaking into computer systems, tricking people into handing over passwords, and even sneaking into buildings was part of your normal daily routine? That is the reality for penetration testers &#x2013; or, more broadly, ethical hackers &#x2013; who get paid to think like criminals so that they can identify and help close security loopholes before the actual bad guys can exploit them.</p>
<p>In this episode of the Unlocked 403 cybersecurity podcast, <a href="https://www.welivesecurity.com/en/our-experts/alzbeta-kovalova/">Becks</a> sits down with ESET penetration testers Tomas Lezovic and Pavol Michalec to give you a peek into the high-stakes world of hacking for good, answering questions like:</p>
<ul type="disc">
<li>Why are some organizations hesitant to engage third-party pentesters?</li>
<li>Do businesses still fail at the basics?</li>
<li>Which sectors and devices require pentesting the most?</li>
<li>How can you join the ranks of pentesters?</li>
<li>How can something as innocuous as a ladder help breach an organization&#x2019;s defenses?</li>
</ul>
<p>Also, don&#8217;t miss a demo of a replay attack that leverages one of today&#8217;s most popular <a href="https://www.welivesecurity.com/en/cybersecurity/small-but-mighty-top-5-pocket-sized-gadgets-boost-ethical-hacking-skills/">hacking gadgets</a>.</p>
<blockquote readability="3.9666666666667">
<p>Connect with us on&#xA0;<a href="https://www.facebook.com/eset">Facebook</a>,&#xA0;<a href="https://x.com/ESET" target="_blank" rel="noopener">X</a>,&#xA0;<a href="https://www.linkedin.com/company/eset/">LinkedIn</a>&#xA0;and&#xA0;<a href="https://www.instagram.com/eset/">Instagram</a>.</p>
</blockquote>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/20/what-is-penetration-testing-unlocked-403-cybersecurity-podcast-ep-10/">What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/20/what-is-penetration-testing-unlocked-403-cybersecurity-podcast-ep-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Katharine Hayhoe: The most important climate equation &#124; Starmus highlights</title>
		<link>https://onlinepitstop.com/2025/02/19/katharine-hayhoe-the-most-important-climate-equation-starmus-highlights/</link>
					<comments>https://onlinepitstop.com/2025/02/19/katharine-hayhoe-the-most-important-climate-equation-starmus-highlights/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 00:23:14 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/19/katharine-hayhoe-the-most-important-climate-equation-starmus-highlights/</guid>

					<description><![CDATA[<p>WeLiveScience The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action 17 Feb 2025 Most people acknowledge that climate change is real and human-driven, yet many still struggle to see how it directly affects their lives. To bridge this gap, Dr. Katharine Hayhoe introduces a simple but powerful</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/19/katharine-hayhoe-the-most-important-climate-equation-starmus-highlights/">Katharine Hayhoe: The most important climate equation | Starmus highlights</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="32.139130434783">
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">WeLiveScience</p>
</div>
<p class="sub-title">The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/editor/" title="Editor"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" alt="Editor"></picture></a></div>
</div>
<p class="article-info mb-5">
        <span>17 Feb 2025</span>
    </p>
</div>
<div readability="53.014925373134">
<p>Most people acknowledge that climate change is real and human-driven, yet many still struggle to see how it directly affects their lives. To bridge this gap, Dr. Katharine Hayhoe introduces a simple but powerful equation:</p>
<p>Science + Worry + Action = Hope</p>
<p>As one of the world&#x2019;s most effective climate communicators, Dr. Hayhoe maintains that understanding the science (head) isn&#x2019;t enough &#x2013; we must also feel its urgency (heart) before we can take meaningful action (hands).</p>
<p>This approach transforms climate awareness into tangible solutions and, indeed, echoes the wisdom of Jane Goodall, who <a href="https://www.welivesecurity.com/en/we-live-science/jane-goodall-reasons-hope-starmus-highlights/" target="_blank" rel="noopener">said during her own Starmus talk</a> that &#x201C;It&#x2019;s only when our clever brain and our human heart come together that we can really reach our full potential.&#x201D;</p>
<p>For more insights, be sure to read our recent <a href="https://www.welivesecurity.com/en/we-live-science/talk-climate-change-people-action-interview-katharine-hayhoe/" target="_blank" rel="noopener">interview with Dr. Hayhoe</a>.</p>
<blockquote readability="14.256302521008">
<div readability="17.457286432161">ESET&#x2019;s commitment to promoting scientific innovation and progress is seen in its ongoing efforts to foster a deep appreciation for science, celebrate the power of groundbreaking research, and connect with leading thinkers in technology and science. ESET recently partnered with Starmus, the global science communication festival, and brought its <a href="https://www.starmus.com/Slovakia" target="_blank" rel="noopener">7<sup>th</sup>&#xA0;edition</a> to Bratislava, Slovakia, in May 2024.</div>
<p>The festival featured a number of thought-provoking perspectives from some of the planet&#x2019;s foremost thinkers. You can now relive the experience from the comfort of your home and get a taste of how the power of technology is being harnessed to tackle some of the most pressing challenges facing the world today.</p>
</blockquote>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/19/katharine-hayhoe-the-most-important-climate-equation-starmus-highlights/">Katharine Hayhoe: The most important climate equation | Starmus highlights</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/19/katharine-hayhoe-the-most-important-climate-equation-starmus-highlights/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gaming or gambling? Lifting the lid on in-game loot boxes</title>
		<link>https://onlinepitstop.com/2025/02/18/gaming-or-gambling-lifting-the-lid-on-in-game-loot-boxes/</link>
					<comments>https://onlinepitstop.com/2025/02/18/gaming-or-gambling-lifting-the-lid-on-in-game-loot-boxes/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 18 Feb 2025 00:22:56 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/18/gaming-or-gambling-lifting-the-lid-on-in-game-loot-boxes/</guid>

					<description><![CDATA[<p>Kids Online The virtual treasure chests and other casino-like rewards inside your children&#x2019;s games may pose risks you shouldn&#x2019;t play down 13 Feb 2025 &#xA0;&#x2022;&#xA0; , 5 min. read Historically, many video games followed a straightforward economic model: pay once, play forever. These days, however, purchasing a game is often just the beginning. At the</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/18/gaming-or-gambling-lifting-the-lid-on-in-game-loot-boxes/">Gaming or gambling? Lifting the lid on in-game loot boxes</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="35.1">
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Kids Online</p>
</div>
<p class="sub-title">The virtual treasure chests and other casino-like rewards inside your children&#x2019;s games may pose risks you shouldn&#x2019;t play down</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><a href="https://www.welivesecurity.com/en/our-experts/editor/" title="Editor"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" media="(max-width: 768px)"></source><img decoding="async" class="author-image me-3" src="https://web-assets.esetstatic.com/tn/-x45/wls/2013/12/pen-tip-200.png" alt="Editor"></picture></a></div>
</div>
<p class="article-info mb-5">
        <span>13 Feb 2025</span><br />
        <span class="d-none d-lg-inline">&#xA0;&#x2022;&#xA0;</span><br />
        <span class="d-inline d-lg-none">, </span><br />
        <span>5 min. read</span>
    </p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2025/02-25/gaming-gambling-loot-boxes.jpeg" media="(max-width: 768px)"></source><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2025/02-25/gaming-gambling-loot-boxes.jpeg" media="(max-width: 1120px)"></source><img decoding="async" class="hero-image" src="https://web-assets.esetstatic.com/tn/-x700/wls/2025/02-25/gaming-gambling-loot-boxes.jpeg" alt="Gaming or gambling? Lifting the lid on in-game loot boxes"></picture>    </div>
</div>
<div readability="124.58173831189">
<p>Historically, many video games followed a straightforward economic model: pay once, play forever. These days, however, purchasing a game is often just the beginning. At the same time, modern gaming has increasingly embraced free-to-play ecosystems, where players get access to the base game at no cost, but are constantly nudged to spend money on in-game items in the hope that these extras will speed up their progress, provide competitive advantages, or enhance their gaming experience.</p>
<p>Enter loot boxes, skin betting, and other microtransactions that have become a controversial feature of many video games. But while the lines between entertainment and gambling have become blurry, the consequences are coming into focus. Once dismissed as a niche concern, sealed mystery boxes and other chance-driven, casino-like rewards are now recognized as potential <a href="https://www.bbc.com/news/technology-56614281">contributors to gambling addiction</a> among <a href="https://www.forbes.com/sites/jasonwosborne/2023/05/25/how-loot-boxes-in-childrens-video-games-encourage-gambling/">children and teens</a>, many of whom don&#x2019;t even realize they&#x2019;re gambling.</p>
<p>Meanwhile, the wheels of regulation turn rather slowly. Many parents, for their part, are also often <a href="https://www.bbc.com/news/technology-48925623">caught off guard</a> and struggle to keep their children and families out of harm&#x2019;s way.</p>
<h2>Tricks of the gaming trade</h2>
<p>Loot boxes &#x2013; not all dissimilar from lottery scratch cards or to digital chocolate eggs containing random plastic toys &#x2013; are perhaps the most controversial type of in-game rewards. Major gaming franchises, such as Candy Crush, Fortnite, FIFA, League of Legends and Final Fantasy, have also relied on revenue from these &#x201C;grab bags&#x201D; and other microtransactions to offset development costs. Studies estimate that by the end of 2025, loot boxes will <a href="https://www.juniperresearch.com/press/video-game-loot-boxes-to-generate-over-20-billion/">generate over US$20 billion</a> in revenue.</p>
<figure class="image"><img decoding="async" title="Source: gov.uk" src="https://web-assets.esetstatic.com/wls/2024/8-2024/apuestas-online-juegos-loot-box.jpeg" alt="apuestas-online-juegos-loot-box" width="" height=""><figcaption><em>Source: <a href="https://www.gov.uk/government/news/companies-must-do-more-to-ensure-safe-and-responsible-gaming-and-take-action-on-loot-boxes-to-protect-young-people" target="_blank" rel="noopener">gov.uk</a></em></figcaption></figure>
<p>For the uninitiated, here&#x2019;s how loot boxes work:</p>
<ul>
<li>a player spends real money to buy a loot box, or receives it as a reward, without knowing what&#x2019;s inside</li>
<li>the content is randomized, making the purchase a gamble</li>
<li>rare and highly desirable rewards are intentionally scarce, encouraging repeated spending</li>
</ul>
<p>This is where the parallels to slot machines and roulette wheels become impossible to ignore. It&#x2019;s little wonder, then, that this mix of suspense, reward, and intermittent reinforcement keeps players coming back, to the point of possibly encouraging addictive spending among especially young people. The problem is further exacerbated by the accessibility of mobile devices and the lack of age verification controls on many platforms.</p>
<p>Indeed, while casinos are subject to regulations and licensing requirements, many video games operate in a legal gray area. For young players, the risk of compulsive spending is particularly real. The consequences can be severe, including the development of gambling behaviors and significant financial losses, often unbeknownst to parents.</p>
<h2>Third-party gambling sites and influencers: The state of play</h2>
<p>Loot boxes aren&#x2019;t just a problem inside games &#x2013; they&#x2019;ve spawned an entire secondary gambling market. Third-party websites allow players to trade or bet their in-game items, such as weapon skins for some highly popular games, for real money.</p>
<p>These sites often operate in a regulatory gray area and face little-to-no regulation. Many of them don&#x2019;t actively stop minors from betting, all while the players who lose money often have no recourse.</p>
<p>The connection between gaming and gambling is often further strengthened by social media influencers who hold massive sway over young audiences. Some may funnel followers into gambling platforms, possibly earning commissions based on user losses &#x2013; and sometimes without disclosing that <a href="https://www.ftc.gov/news-events/news/press-releases/2017/09/csgo-lotto-owners-settle-ftcs-first-ever-complaint-against-individual-social-media-influencers" target="_blank" rel="noopener">they actually owned the platform</a>.</p>
<p><a href="https://www.esetworld.com/" target="_blank" rel="noopener"><img decoding="async" src="https://web-assets.esetstatic.com/wls/2025/02-25/eset-world-2025.png" alt="" width="" height=""></a></p>
<h2>Game over? Hardly</h2>
<p>With the line between gaming and gambling blurrier than ever, regulators have taken notice and the gaming industry may face a reckoning in the future. For now, however, legislation and enforcement remain largely elusive, and gaming companies continue to finetune their engagement and monetization tactics.</p>
<p>Here&#x2019;s a snapshot of legislative action undertaken by some countries vis-&#xE0;-vis loot boxes and other in-game extras:</p>
<h2>What can parents do?</h2>
<p>The problem with loot boxes and other controversial in-game purchases isn&#x2019;t going away anytime soon. What can you as a parent do to help mitigate the underlying risks?</p>
<ul>
<li>Talk to your children about gambling mechanics in games, since chances are high that they don&#x2019;t realize they&#x2019;re engaging in gambling-like behavior. They should understand the difference between earning rewards in a game and spending real money to buy random items.</li>
<li>Keep an eye on what games your child is playing and whether they&#x2019;re engaging with loot boxes or other microtransactions.</li>
<li>Some platforms let you set spending limits and restrict or turn off in-game purchases. Use these features to prevent accidental or excessive spending on loot boxes or other microtransactions.</li>
<li>Enable <a href="https://www.welivesecurity.com/2023/05/12/why-need-parental-control-software-5-features-look-for/">parental controls</a> that can block access to certain games or in-app purchases and/or let you set spending limits or approve any purchases made.</li>
<li>Consider monitoring all their online activity, including the social media influencers they follow.</li>
<li>Set a positive example &#x2013; take your eyes off your own screens and encourage offline hobbies to reduce your <a href="https://www.welivesecurity.com/2020/02/13/digital-addiction-how-get-your-children-off-screens/">children&#x2019;s screen time</a>.</li>
</ul>
<p>Loot boxes and gambling-like mechanics in video games are not just a passing fad, so be aware of the risks. For children, gaming should be an adventure and a <a href="https://www.welivesecurity.com/2023/01/24/5-valuable-skills-children-learn-playing-video-games/">learning experience</a>, not a gamble that may put the well-being of their entire family at risk.</p>
<div readability="5.7121212121212">
<blockquote readability="5.2727272727273">
<p><em>Why not get your children to watch &#x2018;</em><a href="https://saferkidsonline.eset.com/uk/kids-zone" target="_blank" rel="noopener"><em>Hey Pug</em></a><em>&#x2018; on&#xA0;</em><a href="https://saferkidsonline.eset.com/" target="_blank" rel="noopener"><em>Safer Kids Online</em></a><em>? Hey Pug is an animated series by ESET that teaches kids about online security and privacy in an engaging and entertaining way.</em></p>
</blockquote>
</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/18/gaming-or-gambling-lifting-the-lid-on-in-game-loot-boxes/">Gaming or gambling? Lifting the lid on in-game loot boxes</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/18/gaming-or-gambling-lifting-the-lid-on-in-game-loot-boxes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
