Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware

New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware

Posted on January 26, 2026January 26, 2026 By CWS

North Korea’s Lazarus Group has launched a complicated provide chain assault focusing on software program builders via a marketing campaign referred to as “Pretend Font.”

The risk actors are utilizing faux job interviews and malicious GitHub repositories to trick engineers into downloading code that accommodates hidden malware.

This marketing campaign, which started over 100 days in the past, has not too long ago intensified with 19 repositories recognized as a part of the operation.

The malware in the end deploys the InvisibleFerret Python backdoor designed to steal cryptocurrency wallets, browser credentials, and set up long-term entry to compromised machines.

Pretend Font (Supply – OpenSourceMalware)

The assault begins on LinkedIn the place faux recruiters from cryptocurrency and fintech firms contact builders. They pose as hiring managers impressed by the goal’s GitHub profile and request completion of a easy coding evaluation.

Builders are despatched hyperlinks to repositories that seem professional, containing normal internet mission constructions with React frontends, Node.js backends, correct documentation, and CI/CD configurations.

19 GitHub repositories (Supply – OpenSourceMalware)

This genuine look makes the malicious repositories tough to tell apart from real tasks at first look.

OpenSourceMalware analysts recognized and documented how the marketing campaign works. The assault exploits Microsoft Visible Studio Code’s process automation characteristic, which is often utilized by builders for operating checks and constructing tasks.

Hidden inside every malicious repository is a .vscode/duties.json file configured to execute mechanically when the folder is opened in VS Code.

An infection mechanism

The an infection mechanism depends on disguising JavaScript malware as internet font recordsdata with .woff2 extensions.

When a developer opens the repository, VS Code mechanically executes the malicious process, which runs the faux font file via Node.js.

This triggers a multi-stage loader that executes the malware whereas remaining largely invisible to the person.

The presentation settings within the process configuration conceal any output home windows, making the assault tough to detect.

What makes this marketing campaign notably harmful is the way it exploits the professional belief builders place in open-source repositories and growth instruments.

The repository construction seems fully regular, with font recordsdata completely becoming the anticipated mission structure for internet functions utilizing Font Superior icons.

Builders cloning these repositories for a job evaluation don’t have any visible indicators that they’re putting in malware.

The marketing campaign demonstrates how attackers proceed evolving their methods to bypass safety measures.

By chaining collectively social engineering, provide chain vulnerabilities, and tool-specific options, Lazarus Group efficiently targets a high-value viewers with entry to delicate techniques and cryptocurrency belongings.

Safety groups ought to instantly evaluation GitHub repository entry and VS Code configurations throughout their organizations to determine potential compromises from this marketing campaign.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Campaign, Deploy, DPRK, Fake, Fonts, Interview, Leverages, Malware

Post navigation

Previous Post: ‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware
Next Post: MITRE Releases New Cybersecurity Framework to Protect the Embedded Systems

Related Posts

Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details Cyber Security News
UK Sanctions Russian APT 28 Hackers for Attacking Microsoft Cloud Service Login Details UK Sanctions Russian APT 28 Hackers for Attacking Microsoft Cloud Service Login Details Cyber Security News
Apache bRPC Vulnerability Allows Attackers to Crash the Service via Network Apache bRPC Vulnerability Allows Attackers to Crash the Service via Network Cyber Security News
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers Cyber Security News
New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News