Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware

New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware

Posted on January 26, 2026January 26, 2026 By CWS

North Korea’s Lazarus Group has launched a complicated provide chain assault focusing on software program builders via a marketing campaign referred to as “Pretend Font.”

The risk actors are utilizing faux job interviews and malicious GitHub repositories to trick engineers into downloading code that accommodates hidden malware.

This marketing campaign, which started over 100 days in the past, has not too long ago intensified with 19 repositories recognized as a part of the operation.

The malware in the end deploys the InvisibleFerret Python backdoor designed to steal cryptocurrency wallets, browser credentials, and set up long-term entry to compromised machines.

Pretend Font (Supply – OpenSourceMalware)

The assault begins on LinkedIn the place faux recruiters from cryptocurrency and fintech firms contact builders. They pose as hiring managers impressed by the goal’s GitHub profile and request completion of a easy coding evaluation.

Builders are despatched hyperlinks to repositories that seem professional, containing normal internet mission constructions with React frontends, Node.js backends, correct documentation, and CI/CD configurations.

19 GitHub repositories (Supply – OpenSourceMalware)

This genuine look makes the malicious repositories tough to tell apart from real tasks at first look.

OpenSourceMalware analysts recognized and documented how the marketing campaign works. The assault exploits Microsoft Visible Studio Code’s process automation characteristic, which is often utilized by builders for operating checks and constructing tasks.

Hidden inside every malicious repository is a .vscode/duties.json file configured to execute mechanically when the folder is opened in VS Code.

An infection mechanism

The an infection mechanism depends on disguising JavaScript malware as internet font recordsdata with .woff2 extensions.

When a developer opens the repository, VS Code mechanically executes the malicious process, which runs the faux font file via Node.js.

This triggers a multi-stage loader that executes the malware whereas remaining largely invisible to the person.

The presentation settings within the process configuration conceal any output home windows, making the assault tough to detect.

What makes this marketing campaign notably harmful is the way it exploits the professional belief builders place in open-source repositories and growth instruments.

The repository construction seems fully regular, with font recordsdata completely becoming the anticipated mission structure for internet functions utilizing Font Superior icons.

Builders cloning these repositories for a job evaluation don’t have any visible indicators that they’re putting in malware.

The marketing campaign demonstrates how attackers proceed evolving their methods to bypass safety measures.

By chaining collectively social engineering, provide chain vulnerabilities, and tool-specific options, Lazarus Group efficiently targets a high-value viewers with entry to delicate techniques and cryptocurrency belongings.

Safety groups ought to instantly evaluation GitHub repository entry and VS Code configurations throughout their organizations to determine potential compromises from this marketing campaign.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Campaign, Deploy, DPRK, Fake, Fonts, Interview, Leverages, Malware

Post navigation

Previous Post: ‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware
Next Post: MITRE Releases New Cybersecurity Framework to Protect the Embedded Systems

Related Posts

How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort Cyber Security News
AWS Declares Major Outage Resolved After Nearly 24 Hours of Disruption AWS Declares Major Outage Resolved After Nearly 24 Hours of Disruption Cyber Security News
New Spear Phishing Attack Leveraging Argentine Federal Court Rulings to Covert RAT for Remote Access New Spear Phishing Attack Leveraging Argentine Federal Court Rulings to Covert RAT for Remote Access Cyber Security News
Microsoft Investigating Teams Issue that Disables Users from Opening Apps Microsoft Investigating Teams Issue that Disables Users from Opening Apps Cyber Security News
New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages Cyber Security News
New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark