Description

North Korean threat actors Contagious Interview and Famous Chollima have been distributing BeaverTail and InvisibleFerret malware since May 2025, targeting marketing and trader roles in cryptocurrency and retail sectors. Unlike earlier campaigns aimed at developers, this operation uses ClickFix lures—fake CAPTCHAs and troubleshooting prompts—to trick users into executing malicious commands. Malware is delivered as compiled executables for macOS, Windows, and Linux, bypassing interpreter-based defenses and enabling infections on non-developer machines. ? The infection chain begins with a fraudulent hiring site impersonating web3 and e-commerce firms. Users are asked to record video responses, triggering fake camera errors and OS-specific commands that download BeaverTail from nvidiasdk.fly[.]dev. Payloads are filtered by custom headers to evade sandbox detection. Windows and macOS receive bundled executables via PyInstaller or pkg, while Linux hosts install JavaScript payloads through shell scripts. InvisibleFerret follows as a second-stage Python stealer or compiled RAT. This BeaverTail variant shows signs of testing: reduced browser extension targeting (eight vs. 22), limited obfuscation, and novel techniques like extracting Python dependencies from password-protected archives. Hard-coded IP allowlists—including a Russian TransTelecom address—suggest operator protection measures. The campaign also logs IP and geolocation data and probes for crypto wallet objects before exfiltration. Organizations in crypto and retail should monitor for connections to nvidiasdk.fly[.]dev and IP 172.86.93.139, investigate suspicious installer executions, and flag ClickFix-style pop-ups. Scanning for allowlist IPs in logs may reveal operator activity. As BeaverTail tradecraft evolves, proactive monitoring of repositories and supply chains remains essential to defend against these emerging threats.