North Korean Hackers Deploy AkdoorTea Backdoor to Target Global Cryptocurrency Developers

In a recent cybersecurity development, North Korean state-sponsored hackers have been identified utilizing a novel backdoor named AkdoorTea to infiltrate systems of cryptocurrency and Web3 developers worldwide. This campaign, dubbed DeceptiveDevelopment by Slovak cybersecurity firm ESET, employs sophisticated social engineering tactics to compromise targets across multiple operating systems, including Windows, Linux, and macOS.

Sophisticated Social Engineering Tactics

The attackers initiate contact by impersonating recruiters on professional networking platforms such as LinkedIn, Upwork, Freelancer, and Crypto Jobs List. They offer enticing job opportunities to lure developers into their scheme. Once a target expresses interest, they are prompted to complete a video assessment or a coding exercise.

For the video assessment, victims are directed to specially crafted websites that simulate technical issues, such as blocked camera or microphone access. These sites then provide instructions to resolve the fictitious problems, which involve executing commands in the command prompt or Terminal, depending on the victim’s operating system. This process leads to the inadvertent installation of malicious software.

In the case of the coding exercise, victims are instructed to clone specific GitHub repositories. Unbeknownst to them, these repositories contain hidden malware that is installed during the cloning process.

Deployment of Multi-Platform Malware

The DeceptiveDevelopment campaign employs a diverse array of malware designed to operate across different platforms. Key components include:

– BeaverTail and InvisibleFerret: These are initial-stage malware that facilitate the installation of additional malicious payloads.

– OtterCookie: A malware variant that assists in data exfiltration and further system compromise.

– GolangGhost (also known as FlexibleFerret or WeaselStore): This malware focuses on extracting sensitive information from browsers and cryptocurrency wallets. Unlike traditional information stealers, WeaselStore maintains ongoing communication with its command-and-control (C&C) server, allowing it to execute various commands remotely.

– PylangGhost: Another variant used in the campaign to compromise target systems.

Introduction of TsunamiKit and Tropidoor

In addition to the aforementioned malware, the attackers have deployed TsunamiKit and Tropidoor to enhance their capabilities:

– TsunamiKit: Delivered by InvisibleFerret, TsunamiKit is a comprehensive toolkit designed for information and cryptocurrency theft. It comprises several components:

– TsunamiLoader: Initiates the execution of the malware.

– TsunamiInjector: Drops additional components, including TsunamiInstaller and TsunamiHardener.

– TsunamiInstaller: Deploys TsunamiClientInstaller, which then downloads and executes TsunamiClient.

– TsunamiHardener: Establishes persistence for TsunamiClient and configures Microsoft Defender exclusions to evade detection.

– TsunamiClient: The core module that includes spyware capabilities and deploys cryptocurrency miners like XMRig and NBMiner.

Evidence suggests that TsunamiKit may be a modification of an existing dark web project, as samples dating back to December 2021 have been discovered, predating the DeceptiveDevelopment campaign, which is believed to have commenced in late 2022.

– Tropidoor: Distributed via BeaverTail, Tropidoor is another malware used in the campaign. According to ASEC, it shares similarities with tools previously associated with the Lazarus Group, indicating potential overlaps between different North Korean threat actors.

Implications and Recommendations

The DeceptiveDevelopment campaign underscores the evolving tactics of North Korean cyber actors, who are increasingly targeting individuals in the cryptocurrency and Web3 sectors. By leveraging social engineering techniques and deploying multi-platform malware, these attackers aim to infiltrate systems, exfiltrate sensitive data, and potentially disrupt operations.

To mitigate the risk of such attacks, it is crucial for individuals and organizations to:

– Exercise Caution with Unsolicited Job Offers: Be wary of unexpected recruitment messages, especially those that require downloading files or accessing unfamiliar websites.

– Verify the Authenticity of Communications: Confirm the legitimacy of recruiters and job offers through official channels before engaging further.

– Implement Robust Security Measures: Utilize up-to-date antivirus software, conduct regular system scans, and maintain updated operating systems and applications.

– Educate Employees on Social Engineering Tactics: Provide training to recognize and respond appropriately to phishing attempts and other deceptive practices.

By adopting these proactive measures, individuals and organizations can enhance their defenses against sophisticated cyber threats like the DeceptiveDevelopment campaign.