<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>AI deception Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/ai-deception/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/ai-deception/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Fri, 25 Apr 2025 07:51:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>AI deception Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/ai-deception/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>North Korean Hackers Target Crypto Devs!</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Fri, 25 Apr 2025 09:00:24 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI deception]]></category>
		<category><![CDATA[Angeloper]]></category>
		<category><![CDATA[BlockNovas]]></category>
		<category><![CDATA[crypto developers]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[fake companies]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker threat]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[metamask]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[SoftGlide]]></category>
		<category><![CDATA[Web3 threats]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40808</guid>

					<description><![CDATA[<p>A subgroup of Lazarus, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to infect developers with malware. According to Silent Push, these shell companies—BlockNovas, Angeloper Agency, and SoftGlide—are part of a campaign to lure developers through fraudulent job interviews. You Might Be Interested In: Elon Musk</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2705" data-end="3075">A <strong data-start="2707" data-end="2730">subgroup of Lazarus</strong>, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to <strong data-start="2851" data-end="2885">infect developers with malware</strong>. According to <strong data-start="2900" data-end="2915">Silent Push</strong>, these shell companies—<strong data-start="2939" data-end="2953">BlockNovas</strong>, <strong data-start="2955" data-end="2975">Angeloper Agency</strong>, and <strong data-start="2981" data-end="2994">SoftGlide</strong>—are part of a campaign to lure developers through <strong data-start="3045" data-end="3074">fraudulent job interviews</strong>.</p>
<hr />
<p data-start="3077" data-end="3333"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3077" data-end="3333">Two of these companies are even <strong data-start="3109" data-end="3143">legally registered in the U.S.</strong>, adding a layer of legitimacy. During the interview, applicants receive a fake error message while trying to record a video, leading them to copy-paste a fix that actually installs malware.</p>
<h2 data-start="3335" data-end="3390">Malware Targets Wallet Keys and Clipboard Data</h2>
<p class="" data-start="3391" data-end="3692">The campaign utilizes three malware strains: <strong data-start="3436" data-end="3450">BeaverTail</strong>, <strong data-start="3452" data-end="3471">InvisibleFerret</strong>, and <strong data-start="3477" data-end="3493">Otter Cookie</strong>. While <strong data-start="3501" data-end="3515">BeaverTail</strong> is designed for initial compromise and further payload delivery, <strong data-start="3581" data-end="3597">Otter Cookie</strong> and <strong data-start="3602" data-end="3621">InvisibleFerret</strong> focus on extracting <strong data-start="3642" data-end="3664">crypto wallet keys</strong> and <strong data-start="3669" data-end="3691">clipboard contents</strong>.</p>
<p class="" data-start="3694" data-end="4003">Silent Push also discovered that hackers are using <strong data-start="3745" data-end="3768">AI-generated images</strong> and <strong data-start="3773" data-end="3795">stolen real photos</strong> to create fake employee profiles for the companies, boosting credibility. Analyst <strong data-start="3878" data-end="3894">Zach Edwards</strong> noted that some images were subtly altered using AI tools to resemble the original person but appear unique.</p>
<p class="" data-start="4005" data-end="4273">The campaign has been active <strong data-start="4034" data-end="4048">since 2024</strong>, and <strong data-start="4054" data-end="4081">at least two developers</strong> were directly affected—one of whom had their <strong data-start="4127" data-end="4158">MetaMask wallet compromised</strong>. The <strong data-start="4164" data-end="4171">FBI</strong> has since shut down <strong data-start="4192" data-end="4206">BlockNovas</strong>, but <strong data-start="4212" data-end="4225">SoftGlide</strong> and other parts of the operation remain online.</p>
<p data-start="4005" data-end="4273"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-154152 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kuzey-kore.jpg" alt="Kuzey Kore" width="899" height="387" /></p>
<hr />
<p data-start="4005" data-end="4273"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
