2/ ...and it just so happens that #PaloAlto released a long investigation into a newer and less well known North Korean crypto operation called "Slow Pisces" and/or "Jade Sleet" at the same time.

This time the #DRPK's crypto thieves pose as recruiters on LinkedIn and try to lure developers into doing various coding challenges hosted on #GitHub as part of a job interview. Doing a challenge leads to infection with custom Python #malware.

https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/

#NorthKorea #LazarusGroup #crypto #cybersecurity #infosec #espionage #programming #Stellar #Metamask #NickLFranklin #SlowPisces #JadeSleet #Python #macOS #GitHub

Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware

North Korean state-sponsored group Slow Pisces (Jade Sleet) targeted crypto developers with a social engineering campaign that included malicious coding challenges. North Korean state-sponsored group Slow Pisces (Jade Sleet) targeted crypto developers with a social engineering campaign that included malicious coding challenges.

Unit 42
"Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware" published by PaloaltoNetworks. #RNLoader, #RNStealer, #SlowPisces, #DPRK, #CTI https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/
Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware

North Korean state-sponsored group Slow Pisces (Jade Sleet) targeted crypto developers with a social engineering campaign that included malicious coding challenges. North Korean state-sponsored group Slow Pisces (Jade Sleet) targeted crypto developers with a social engineering campaign that included malicious coding challenges.

Unit 42
Threat Assessment: North Korean Threat Groups

Explore Unit 42's review of North Korean APT groups and their impact, detailing the top 10 malware and tools we've seen from these threat actors. Explore Unit 42's review of North Korean APT groups and their impact, detailing the top 10 malware and tools we've seen from these threat actors.

Unit 42