Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/Threats/Lazarus Graphalgo Fake Recruiter Spreads Malware via
Threats

Lazarus Graphalgo Fake Recruiter Spreads Malware via

North Korean state-sponsored hackers, the Lazarus Group, have initiated a sophisticated fake recruiter campaign, dubbed ‘graphalgo,’ directly targeting cryptocurrency developers. Active...

Jennifer sherman
Jennifer sherman
February 12, 2026 3 Min Read
0 0

North Korean state-sponsored hackers, the Lazarus Group, have initiated a sophisticated fake recruiter campaign, dubbed ‘graphalgo,’ directly targeting cryptocurrency developers.

Active since May 2025, this coordinated attack uses fraudulent job offers to distribute remote access trojans to unsuspecting developers working with blockchain and cryptocurrency technologies.

The campaign exploits trusted open-source package repositories including GitHub, npm, and PyPI, turning legitimate development workflows into infection vectors.

Attackers approach potential victims through professional networking platforms like LinkedIn and Facebook, or by posting job advertisements on developer forums such as Reddit.

The social engineering scheme revolves around employment opportunities at fake companies involved in blockchain and cryptocurrency exchanges, most notably “Veltrix Capital.”

Victims receive coding test assignments that appear legitimate but contain hidden malicious dependencies designed to compromise their systems upon execution.

Campaign overview (Source - ReversingLabs)
Campaign overview (Source – ReversingLabs)

What makes this campaign particularly dangerous is its modular architecture, which allows threat actors to maintain operations even when portions are exposed.

This new branch of the fake recruiter campaign has been identified by ReversingLabs researchers and named it after the first malicious package discovered in the npm repository.

Their analysis revealed that the npm package “bigmathutils” accumulated over 10,000 downloads before a weaponized version was released, demonstrating patience characteristic of state-sponsored operations.

Infection Mechanism and Multi-Stage Payload Delivery

The infection process begins when developers receive job interview tasks through GitHub repositories controlled by the fake companies.

These repositories contain coding assignments for DevOps or blockchain positions. However, embedded within project files are dependencies pointing to compromised packages hosted on npm and PyPI repositories.

Malicious dependency in one of the job tasks (Source - ReversingLabs)
Malicious dependency in one of the job tasks (Source – ReversingLabs)

When victims run or debug the interview code, package managers automatically install these malicious dependencies.

The packages include multiple obfuscation layers and encrypted payloads that download second-stage malware from command-and-control servers.

Active recruiting through direct communication (Source – ReversingLabs)

The final payload is a fully functional RAT capable of executing arbitrary commands, uploading files, listing processes, and checking for the MetaMask browser extension—indicating interest in stealing cryptocurrency funds.

Three versions of the RAT have been identified, written in JavaScript, Python, and Visual Basic Script. The malware communicates with C2 servers using token-protected authentication, preventing security researchers from analyzing server responses.

This token mechanism has been observed in other North Korean campaigns, strengthening attribution to Lazarus Group.

The presence of GMT+9 timezone timestamps in git commits and cryptocurrency-focused social engineering align with established North Korean threat actor patterns.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Adblock Filters Expose User Location Even With VPN Protection

Next Post

Google Warns: Hackers Exploit Gemini AI in Leveraging Stages

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us