Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Nation-State

Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks

North Korea’s Lazarus hackers are using the ClickFix technique for malware deployment in fresh attacks targeting the cryptocurrency ecosystem.

North Korea hacks South Korea

The North Korea-linked APT tracked as Lazarus has been using the ClickFix technique to deliver malware in recent attacks involving fake job opportunities for cryptocurrency developers.

Lazarus has been targeting the cryptocurrency ecosystem for years, stealing roughly $2 billion in virtual assets in 2023 and 2024. In March 2025, Lazarus stole $1.5 billion in cryptocurrency from UAE-based crypto exchange platform Bybit.

The group is also known to have targeted software developers, mainly those interested in cryptocurrency, as part of multiple campaigns, such as Operation Dream Job, Contagious Interview, and DeceptiveDevelopment.

According to cybersecurity firm Sekoia, the newly identified attacks are a continuation of the Contagious Interview campaign, which started in 2022, targeting cryptocurrency developers looking for new job opportunities with a Go backdoor named GolangGhost.

Dubbed ClickFake Interview, the fresh campaign relies on multiple fake job interview websites using the ClickFix technique to trick Windows and macOS users into installing malware.

The attacks begin with social media messages inviting the unsuspecting victims to fake cryptocurrency-related interviews. The target is served the URL for a third-party website where the fake interview is supposed to take place.

The threat actor set up dozens of fake interview websites, sending hundreds of invitations (Sekoia retrieved 184 different invitations) and impersonating over a dozen centralized and decentralized finance entities, including Coinbase, Archblock, KuCoin Exchange, Ripple, and Chainalysis.

The fake interview websites have the same user interface, use ReactJS to dynamically load content from a JavaScript file, and include around 10 tailored invitations.

Advertisement. Scroll to continue reading.

Once on the website, the victim is asked to complete several steps, including filling out a contact form, responding to several questions, and using their device’s camera to record an introductory video, before getting ready for the interview.

The ClickFix technique is triggered when the victim attempts to enable the camera: the website serves them an error message claiming a driver needs to be installed and instructing them to download it by executing a specific code using the command prompt on Windows, or the Terminal app on macOS.

The infection chain results in the installation of GolangGhost, a backdoor written in Go that allows the attackers to download/upload files, execute shell commands, launch a Chrome stealer, and retrieve system information.

“It was found that all the positions were not related to technical profiles in software development. They are mainly jobs of manager focusing on business development, asset management, product development or decentralized finance specialists,” Sekoia notes.

Related: North Korean Hackers Targeting Freelance Software Developers

Related: North Korean APT Exploited IE Zero-Day in Supply Chain Attack

Related: North Korean Hackers Distributed Android Spyware via Google Play

Related: Iranian Hackers Target Aerospace Industry in ‘Dream Job’ Campaign

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.