• CONTACT
  • MARKETCAP
  • BLOG
Coin Mela Coin Mela
  • Home
  • News
    • All News
    • Bitcoin
    • Ethereum
    • XRP
    • Altcoins
    • NFT
    • Blockchain
    • Web3
    • DeFi
    • Finance
    • Stocks
    • Company
  • Learn
  • Market
  • Advertise
Reading: North Korean Hackers Shift Tactics to Target Cryptocurrency and Retail Sectors with ClickFix Malware Lures
Share
  • bitcoinBitcoin(BTC)$112,920.00
  • ethereumEthereum(ETH)$4,190.27
  • tetherTether(USDT)$1.00
  • rippleXRP(XRP)$2.86
  • binancecoinBNB(BNB)$999.83
  • solanaSolana(SOL)$218.69
  • usd-coinUSDC(USDC)$1.00
  • dogecoinDogecoin(DOGE)$0.240955
  • staked-etherLido Staked Ether(STETH)$4,187.42
  • tronTRON(TRX)$0.339665
CoinMelaCoinMela
Font ResizerAa
  • Home
  • News
  • Learn
  • Market
  • Advertise
Search
  • Home
  • News
    • All News
    • Bitcoin
    • Ethereum
    • XRP
    • Altcoins
    • NFT
    • Blockchain
    • Web3
    • DeFi
    • Finance
    • Stocks
    • Company
  • Learn
  • Market
  • Advertise
Have an existing account? Sign In
Follow US
© Coin Mela Network. All Rights Reserved.
News

North Korean Hackers Shift Tactics to Target Cryptocurrency and Retail Sectors with ClickFix Malware Lures

News Desk
Last updated: September 22, 2025 2:37 am
News Desk
Published: September 22, 2025
Share
crypto phishing

Threat actors linked to the Democratic People’s Republic of Korea (DPRK) are increasingly employing ClickFix-style lures to distribute malware, notably BeaverTail and InvisibleFerret. Recent intelligence from GitLab highlights a shift in targeting strategies, focusing on marketing and trading roles within cryptocurrency and retail sectors, rather than traditional software development positions.

BeaverTail and InvisibleFerret were initially unveiled by Palo Alto Networks in late 2023, forming part of a broader campaign known as Contagious Interview, which has been active since December 2022. This initiative aims to deliver malware to software developers under the guise of job assessments. Evaluated as a subset of the Lazarus group, these threat actors have used various methods for propagation, including fraudulent npm packages and fake Windows videoconferencing tools.

In a noteworthy development, the latest wave of attacks—identified in May 2025—stands out for its delivery mechanism and target audience. The attackers employed ClickFix tactics to distribute BeaverTail, utilizing a fake hiring platform built using Vercel that advertised various Web3 positions alongside opportunities in cryptocurrency trading. Uniquely, this campaign appears to have shifted focus to marketing applicants, diverging from the typical emphasis on developers and cryptocurrency professionals.

Victims navigating to the malicious site find their public IP addresses logged and are prompted to record a video assessment. A fabricated technical issue concerning microphone functionality leads them to execute specific commands tailored to their operating systems, ultimately facilitating the download of a leaner BeaverTail version via shell or Visual Basic scripts. This variant exhibits a streamlined information-stealing routine and only targets eight browser extensions, a significant reduction from previous variants that targeted 22 extensions.

Additionally, the Windows version of BeaverTail utilizes a password-protected archive for loading Python dependencies related to InvisibleFerret. This tactic, while not novel within the broader cyber threat landscape, marks a first for BeaverTail, indicating that these threat actors are refining their operational strategies. Despite this evolution, preliminary assessments suggest that the scope of the campaign may have been limited, signaling more of a test phase rather than large-scale deployment.

In a larger context, recent collaborative research from SentinelOne, SentinelLabs, and Validin revealed that at least 230 individuals were targeted in cryptocurrency-related job interviews between January and March 2025. This effort included impersonating reputable firms like Archblock, Robinhood, and eToro, using ClickFix strategies to spread malicious Node.js applications that masquerade as critical updates.

The operational tactics of the DPRK-linked threat actors reveal an ongoing adaptation to maintain effectiveness despite challenges. Their research incorporates monitoring for potential detection of their activities and acquiring new infrastructure as needed, emphasizing a preference toward rapid provisioning to sustain operations rather than overhauling existing frameworks.

Amidst these developments, a notable ascendance of the Kimsuky hacking group has also been observed. Recently, they were implicated in two separate campaigns that exploited GitHub repositories for malware distribution and executed spear-phishing efforts utilizing deepfake technology. Their activities demonstrate a significant shift toward deploying malicious payloads using trusted infrastructures and advanced methods, including the generation of counterfeit military ID cards aimed at South Korean defense personnel.

These incidents illustrate not only the persistent threat posed by North Korean hackers but also their evolving strategies, which now encompass both espionage and financially motivated activities. The integration of new technologies, such as deepfake creation and refined delivery systems, suggests a sophisticated operational posture that capitalizes on emerging vulnerabilities in both human and technical layers of security.

Major Cryptocurrency Whale Moves $10M from Binance to DeFi, Ignites Ethereum Speculation
S&P and Nasdaq futures rise after Senate confirms Trump’s Fed pick Stephen Miran
UK Trade Groups Push for Blockchain Inclusion in US Tech Bridge Agreement Amid Trump Visit
Pantera Capital Highlights Solana’s Potential Ahead of Possible ETF Approval
China’s Pop Culture Group Invests $33M in Bitcoin as Market Reaches $114K
Share This Article
Facebook Whatsapp Whatsapp
ByNews Desk
Follow:
CoinMela News Desk brings you the latest updates, insights, and in-depth coverage from the world of cryptocurrencies, blockchain, and digital finance.
Previous Article a79fd8dd57714227acfff00b991bc507 Bitcoin’s Political Future Awaits Major Announcement Impacting Crypto Landscape
Next Article nbpk29lftmd8l4u3wfzb John Tavares Reflects on Olympic Gold and Aims for Redemption at Milano Cortina 2026
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News
446602aa 5eb6 4127 999c f92a5868c908
Cavitation Technologies Appoints Anton Glotser as VP of Blockchain Infrastructure Technology at XYRA Corp.
hong kong decrypt style 02 gID 7
China’s Regulators Advise Brokers to Pause Offshore RWA Tokenization Amid Hong Kong’s Digital Asset Growth
remittix 8.webp
Remittix Dominates Discussions on the Best Cryptos to Buy Ahead of Q4 2025
- Advertisement -
Ad image

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Twitter Youtube Telegram Linkedin
Coin Mela Coin Mela
CoinMela is your one-stop destination for everything Crypto, Web3, and DeFi news.
  • About Us
  • Contact Us
  • Corrections
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Advertise with Us
  • Quick Links
  • Finance
  • Company
  • News
  • Bitcoin
  • XRP
  • Ethereum
  • Stocks
  • Altcoins
  • Blockchain
  • DeFi
© Coin Mela Network. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?