2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Researchers tracked Lazarus Group's Chollima division using fake job offers to infiltrate companies. They captured operators in a controlled environment, revealing tools for identity theft and remote access without deploying malware. This highlights the risks of remote hiring for businesses.
If you do, here's more
A joint investigation led by Mauro Eldritch from BCA LTD, along with NorthScan and ANY.RUN, has revealed a sophisticated infiltration scheme linked to North Korea’s Lazarus Group, particularly its Chollima division. Researchers observed the group's operations in real-time, utilizing controlled sandbox environments that mimicked real developer laptops. The operation began when NorthScan's Heiner García impersonated a U.S. developer targeted by a recruiter named “Aaron,” who aimed to hire him as a frontman. This tactic is common for Chollima, which infiltrates Western companies in sectors like finance and healthcare by using stolen identities and automated interview processes.
The team set up a “laptop farm” that was not actually composed of physical machines but rather virtual environments created by ANY.RUN. These setups included configurations that resembled real workstations and enabled the researchers to monitor the operators without detection. The tools discovered were primarily designed for identity theft and remote access, rather than traditional malware. The operators employed AI-driven job automation tools to streamline applications and interviews, as well as browser-based OTP generators for two-factor authentication once they obtained identity documents. They also used Google Remote Desktop for persistent access and routine system checks to ensure compatibility with the target's environment.
The findings highlight a significant threat for companies engaging in remote hiring practices. Attackers can exploit seemingly legitimate recruitment efforts to gain insider access, posing risks that extend beyond individual employees. An infiltrator can compromise sensitive business data and internal systems, creating a broader risk to organizational security. This investigation serves as a reminder of the importance of vigilance in hiring processes and the need for companies to educate employees about suspicious activity.
Questions about this article
No questions yet.