North Korean threat actors Contagious Interview and Famous Chollima have been distributing BeaverTail and InvisibleFerret malware since May 2025, targeting marketing and trader roles in cryptocurrency and retail sectors. Unlike earlier campaigns aimed at developers, this operation uses ClickFix lures—fake CAPTCHAs and troubleshooting prompts—to trick users into executing malicious commands. Malware is delivered as compiled executables for macOS, Windows, and Linux, bypassing interpreter-based defenses and enabling infections on non-developer machines. ? The infection chain begins with a fraudulent hiring site impersonating web3 and e-commerce firms. Users are asked to record video responses, triggering fake camera errors and OS-specific commands that download BeaverTail from nvidiasdk.fly[.]dev. Payloads are filtered by custom headers to evade sandbox detection. Windows and macOS receive bundled executables via PyInstaller or pkg, while Linux hosts install JavaScript payloads through shell scripts. InvisibleFerret follows as a second-stage Python stealer or compiled RAT. This BeaverTail variant shows signs of testing: reduced browser extension targeting (eight vs. 22), limited obfuscation, and novel techniques like extracting Python dependencies from password-protected archives. Hard-coded IP allowlists—including a Russian TransTelecom address—suggest operator protection measures. The campaign also logs IP and geolocation data and probes for crypto wallet objects before exfiltration. Organizations in crypto and retail should monitor for connections to nvidiasdk.fly[.]dev and IP 172.86.93.139, investigate suspicious installer executions, and flag ClickFix-style pop-ups. Scanning for allowlist IPs in logs may reveal operator activity. As BeaverTail tradecraft evolves, proactive monitoring of repositories and supply chains remains essential to defend against these emerging threats.
Cybercriminals are now weaponizing legitimate hotel reservation data to trick travelers into surrendering their payment details. This "Reservation Hijack Scam" stands out b...
A serious security issue has been discovered in nginx-ui, which can allow attackers to take full control of a system. This vulnerability is tracked as CVE-2026-33026. The problem e...
A sophisticated phishing campaign is targeting Spanish speaking users across Latin America and Europe, aiming to deploy Windows banking malware such as Casbaneiro (also known as Me...