Crypto Devs Beware: Contagious Interview Campaign Deploys Backdoors and Fake MetaMask for Stealthy Theft
Crypto Devs Beware: Campaign Deploys Backdoors and Fake MetaMask for Stealthy Theft
Imagine getting a dream job offer in the booming crypto or Web3 world. You eagerly run the code they send for a “technical test.” Suddenly, hackers have full control of your computer and are draining your cryptocurrency wallets. This is no movie plot—it’s the real
Security experts have exposed this sneaky operation. Attackers, linked to North Korean hackers, use fake job interviews to trick victims into installing advanced malware. Their goal? Steal wallet keys, private info, and crypto funds worth millions.
What is the Campaign?
The
These aren’t random hits. Targets are skilled developers handling blockchain projects, smart contracts, and DeFi apps. Why? They often have high-value crypto wallets on their machines.
- Fake job offers via LinkedIn, email, or Discord.
- Malicious code in npm packages or project folders.
- Cross-platform attacks on Windows, macOS, and Linux.
Step-by-Step: How the Infection Happens
Let’s break down the attack chain. It’s clever and hard to spot.
Stage 1: The Trojan Horse Entry
Everything starts with a poisoned JavaScript file in a fake dev package. When you execute it—thinking it’s part of the test—it phones home to the attackers’ command-and-control (C2) server. This “beacon” confirms you’re infected and downloads more nasty tools.
Stage 2: Backdoor Deployment
Next comes a multi-tool payload:
- Two JavaScript modules for remote control.
- A Python backdoor named InvisibleFerret.
InvisibleFerret acts like a ghost in your system. It stays hidden, keeps a live connection to hackers, and runs any command they send. They can upload scripts, grab files, or watch your screen.
Stage 3: Hunting for Crypto Gold
The malware doesn’t guess—it searches smartly. It scans for files with keywords like:
- wallet
- seed
- private
- keys
- mnemonic
- password
It grabs browser logins, password managers, and crypto wallet data. Everything gets beamed to hacker servers automatically.
The Killer Move: Counterfeit MetaMask Wallet
Here’s where it gets scary. After owning your PC, attackers don’t just steal data—they swap your MetaMask extension with a fake one.
- Scan Chrome or Brave for the real MetaMask folder.
- Download their evil version.
- Tweak browser config files to load the fake.
- Bypass security by faking signatures and flipping on developer mode.
The fake MetaMask looks and works exactly like the real one. You unlock your wallet as usual. But sneaky code captures your password and vault data. Hackers decrypt it later offline, grab seed phrases, and empty your funds.
They added just a few lines of code to keep it stealthy. No crashes, no alerts—just silent theft.
Who’s Behind It? North Korean Hackers Strike Again
Researchers point fingers at North Korean groups. These state-sponsored crews have a history of crypto heists. They’ve stolen over $2 billion in digital assets since 2017, funding regimes through ransomware and wallet drains.
Why Crypto Devs Are Prime Targets
Developers test code daily, running untrusted scripts is routine. Add job pressure, and defenses drop. Web3 pros hold testnet funds, mainnet wallets, and API keys—pure gold for thieves.
This shift shows crypto security’s new front: not smart contracts, but your endpoint security.
How to Protect Yourself from and Similar Threats
Don’t be the next victim. Follow these simple, effective tips:
Basic Hygiene
- Never run unknown code from job interviews. Use sandboxes or VMs.
- Verify recruiters on official channels.
- Scan files with antivirus before opening.
Wallet Security
- Switch to hardware wallets like Ledger or Trezor for big holdings.
- Check browser extensions regularly—look for odd updates.
- Use multi-sig wallets for teams.
Advanced Steps
- Enable 2FA everywhere.
- Monitor for C2 traffic with tools like Wireshark.
- Keep OS and browsers patched.
Pro tip: Isolate dev environments. Run risky code in Docker containers or cloud VMs, never on your main machine.
The Bigger Picture: User-Side Attacks on the Rise
Stay vigilant. The next “job opportunity” could cost you everything.
Final Thoughts
The
What steps will you take today? Share in the comments below.
Discuss this news on our Telegram Community. Subscribe to us on Google news and do follow us on Twitter @Blockmanity
Did you like the news you just read? Please leave a feedback to help us serve you better
Disclaimer: Blockmanity is a news portal and does not provide any financial advice. Blockmanity's role is to inform the cryptocurrency and blockchain community about what's going on in this space. Please do your own due diligence before making any investment. Blockmanity won't be responsible for any loss of funds.
















