Close Menu
  • Home
  • Technology
  • Gaming
  • Technology
  • People’s Favorite
  • Latest Movie Review

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Top 10 Indian Social Media Apps in India

October 13, 2025

Physicists Win 2025 Nobel Prize for Groundbreaking Quantum

October 13, 2025

Microsoft Acknowledges GoAnywhere Vulnerability Exploited by Medusa Ransomware

October 8, 2025
Facebook X (Twitter) Instagram
  • Technology
  • Trending Videos
  • Phones & Tech
  • New Gadgets
Facebook X (Twitter) Instagram Pinterest Vimeo
TechyeuTechyeu
  • Home
  • Technology
  • Gaming
  • Technology
  • People’s Favorite
  • Latest Movie Review
Subscribe
TechyeuTechyeu
Home » Cyber Alert: North Korean Hackers Are Using the New “AkdoorTea” Malware
Featured

Cyber Alert: North Korean Hackers Are Using the New “AkdoorTea” Malware

TechyeuBy TechyeuSeptember 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
North Korean Hackers Deploy New “AkdoorTea
Share
Facebook Twitter LinkedIn Pinterest Email

North Korean Hackers Target Crypto & Web3 Developers with AkdoorTea

North Korean hackers are intensifying their global campaign against cryptocurrency and Web3 developers, using a new backdoor called AkdoorTea to infiltrate victims’ systems, according to a fresh research from Slovak cybersecurity firm ESET. ESET researchers detail a campaign named DeceptiveDevelopment that uses recruiter lures, trojanized projects and a new backdoor called AkdoorTea to compromise developers.

Overview

Slovak cybersecurity firm ESET has published research showing an escalation in operations by North Korea-linked threat actors who target cryptocurrency and Web3 developers. Tracked as Deceptive Development, the activity overlaps with campaigns known as Contagious Interview, DEV#POPPER and Void Dokkaebi. The attackers focus on developers across Windows, Linux, and macOS, using social engineering on job platforms to trick victims into installing malware.

How the campaign operates

Attackers impersonate recruiters on job sites such as LinkedIn, Upwork, Freelancer and Crypto Jobs List. Typical steps include:

  • Initial contact: Fake recruiter outreach offering lucrative developer roles.
  • Challenges and assessments: Targets are asked to clone projects or complete video-based interview tasks that execute malicious code.
  • Trojanized deliverables: GitHub repositories or downloadable “assignments” contain obfuscated scripts and installers that drop malware.

The attackers also use a “ClickFix” technique during fake video interviews: victims see simulated camera or mic errors and are instructed to run terminal commands, which trigger payload execution.

Tooling and malware families

ESET’s analysis shows a multi-platform toolkit combining custom and re-used malware. Notable components include:

  • BeaverTail, InvisibleFerret, WeaselStore — information stealers that target crypto wallets, browser logins and keychains.
  • TsunamiKit — multi-stage toolkit for persistence, .NET spyware deployment and cryptominer installation (XMRig, NBMiner).
  • Tropidoor & PostNapTea — remote access trojans (RATs) associated with Lazarus-style operations featuring screen capture and file exfiltration.
  • AkdoorTea — the latest backdoor hidden in a file masquerading as an NVIDIA driver update; often launched through BeaverTail.

Hybrid threat model: fraud and malware

ESET links DeceptiveDevelopment to North Korea’s broader WageMole scheme. In WageMole, covert workers use stolen or AI-generated identities to obtain remote jobs. Attackers may even use face-swapping during live interviews to appear authentic. Stolen data from malware campaigns is recycled to craft more convincing fake identities and job offers, creating a feedback loop between malware-driven theft and fraudulent hiring.

Why developers and employers should care

Key risks: Developers risk losing sensitive keys and credentials, while companies risk onboarding compromised workers who might act as insider threats. The campaign blurs state-sponsored espionage and organized cybercrime, increasing the urgency for stronger hiring and security checks.

ESET emphasizes that the operation relies more on creative social engineering and scale than on novel technical tricks. The actors reuse open-source tools, rent malware, and adapt dark-web projects to run large volumes of recruitment lures.

Practical defenses

  • Verify recruiter identities: confirm roles and contacts through independent channels before accepting tasks or downloads.
  • Avoid running untrusted code: don’t execute terminal commands or install packages from unknown sources.
  • Use hardware wallets and strong key management: limit exposure of private keys on developer machines.
  • Harden hiring processes: require live verification, multi-factor validation, and robust background checks.
  • Deploy endpoint detection and regular scans to detect information stealers and RATs.

Read More : TorrentGalaxy Proxy List 2025 – Proxy/Mirror/Alternatives

Conclusion

The DeceptiveDevelopment campaign highlights a growing trend: attackers combine low-effort, high-scale social engineering with readily available malware to target high-value victims in the crypto and Web3 ecosystem. Developers and hiring organizations must tighten verification and adopt layered security controls to reduce both technical and human-centred risks.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAjey: The Untold Story of a Yogi (2025) – Cast, Release Date, Reviews, Trailer & OTT Updates
Next Article Oracle Group Deal Finalized: TikTok Stays in U.S.
Techyeu
  • Website

Anything and everything because titles should not define us. A non-fiction lover. Aspiring to be better than yesterday.

Related Posts

Featured

Top 10 Indian Social Media Apps in India

October 13, 2025
Featured

Physicists Win 2025 Nobel Prize for Groundbreaking Quantum

October 13, 2025
Featured

Microsoft Acknowledges GoAnywhere Vulnerability Exploited by Medusa Ransomware

October 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

TorrentGalaxy Proxy List 2025 – Proxy/Mirror/Alternatives

September 5, 202537 Views

Mozilla Extends Firefox Windows 7, 8, And 8.1

September 6, 202517 Views

OpenAI Posts $4.3B in First-Half Revenue, Up 16%

September 30, 202513 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

TorrentGalaxy Proxy List 2025 – Proxy/Mirror/Alternatives

September 5, 202537 Views

Mozilla Extends Firefox Windows 7, 8, And 8.1

September 6, 202517 Views

OpenAI Posts $4.3B in First-Half Revenue, Up 16%

September 30, 202513 Views
Our Picks

Top 10 Indian Social Media Apps in India

October 13, 2025

Physicists Win 2025 Nobel Prize for Groundbreaking Quantum

October 13, 2025

Microsoft Acknowledges GoAnywhere Vulnerability Exploited by Medusa Ransomware

October 8, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Technology
  • Gaming
  • Technology
  • People’s Favorite
  • Latest Movie Review
© 2025 Techyeu. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.