North Korean Hackers Adopt Clickfix Attacks to Target Crypto Firms
Summary:
North Korea’s Lazarus Group has adopted a new tactic known as "ClickFix" in its ongoing efforts to compromise job seekers in the cryptocurrency industry, particularly within the centralized finance space. According to cybersecurity firm Sekoia, this marks an evolution of the group’s earlier “Contagious Interview” campaign, which targeted individuals through fake job offers and coding tests. In the new variation, dubbed “ClickFake,” Lazarus impersonates well-known crypto companies such as Coinbase, KuCoin, Kraken, Circle, and Robinhood to lure victims into remote interviews.
Victims are directed to convincing websites built with ReactJS that mimic legitimate job application portals. These sites ask applicants to submit video introductions using their webcams. When attempting to do so, users encounter a fabricated error claiming a driver issue is preventing access to their camera. To "fix" the issue, they are instructed to run specific commands in either the Windows Command Prompt or macOS Terminal, depending on their operating system. These commands execute a Go-based backdoor known as GolangGhost, which establishes persistence through registry changes or LaunchAgent plist files.
Once deployed, GolangGhost connects to a command-and-control (C2) server, registering the infected system and enabling capabilities such as executing shell commands, stealing Chrome cookies, browser history, and stored passwords, and collecting system metadata. Unlike previous efforts that primarily targeted developers and coders, this campaign now focuses on individuals in non-technical roles, such as business development and marketing professionals.
Security Officer Comments:
Sekoia analyzed 184 fake interview invitations and identified 14 different company names being misused as lures. Although the ClickFake tactic is a recent development, the original Contagious Interview approach remains active, suggesting that Lazarus may be testing both methods in parallel.
Suggested Corrections:
To defend against these threats, experts warn users never to execute unknown commands from the internet and to remain cautious when receiving unsolicited interview invitations. Sekoia has also released Yara detection rules and a full list of indicators of compromise (IOCs) to help organizations identify and mitigate this malicious activity.
Link(s):
https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/
https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/