News center > News > Headlines > Context
LinkedIn Recruitment Phishing Analysis
Editor
3 hours ago 8,522

LinkedIn Recruitment Phishing Analysis

Author: 23pds & Thinking

Background

In recent years, phishing incidents against blockchain engineers have occurred frequently on the LinkedIn platform. Yesterday, we noticed a post posted by @_swader_ on X. This experience is actually a microcosm of the recruitment of blockchain engineers for fishing. Next, let’s analyze this case.

(https://x.com/_swader_/status/1900116168544817589)

Process

According to Bruno's description, a person who claimed to be the project party took the initiative to contact him and sent him a long project introduction:

The content mainly involves recruitment information for a blockchain Socifi game and staking smart contract platform.

Project Overview

This project is a staking smart contract platform based on Socifi games. Core functions include:

• Decentralized exchange

• Game

• Multi-game community functions

• NFTs and Tokens

• Live service

Recruitment intention

• Find developers to join the project.

• Backend and smart contract developers have been recruited.

• Recommend Bruno Skvorc as project manager/head of the front-end development team.

MVP Design

• The sender provides FigmaDesign link to MVP v2 version.

Recruitment Process

Background Survey

Online Programming Test

Technical Interview

Start the recruiter was vague and then started calling Bruno in an attempt to convey a sense of urgency and importance, and immediately provided a repo link: https://bitbucket[.]org/ventionteam/gameplatform/src/main/.

User and the time to submit the code:

Next we analyze the malicious code.

Technical and tactics

Let's look at the code description:

So is its real function like this?

First look at package.json:

No malicious third-party modules were found, and it seems that they were not attacked through malicious NPM packages. We continue to analyze. When we see server.js, if we don’t pay attention, seeing line 47 may end. After all, there seems to be nothing abnormal when we look at it at first glance.

But, pay attention to carefully looking at line 46, what is that? And there are very small horizontal scroll bars, which means there is something on the right! Let's drag it over and take a look:

This is an encrypted malicious payload, its specific workWhat to use? Let's take a look at the code:

(The above picture is part of the code)

This is encrypted code, and more than one layer, base64 encryption.

After running npm start, it will run normally, so what is the use of this payload?

We run the tests on the virtual machine (professional operation, please do not imitate).

I found that this attack method is confusing and decrypting is troublesome. We directly caught the C2 link through the Hook method:

Successfully caught the malicious IP:

216.173.115[.]200

95.179.135[.]133

45.59.163[.]56

45.59.1[.]2

5.135.5[.]48

Malicious request: http://216.173.115[.]200:1244/s/bc7302f71ff3. Interestingly, this malicious request actually bypassed the monitoring detection of little snitch.

The attacker downloads and executes the files, two files, test.js and .npl.

The .npl Trojan is mainly used for permission maintenance:

This is the decoded content of .npl:

The above code is used to download a Python program called pay. The decoded content is as follows:

The attacker uses Python execution .npl is used to maintain permissions.

test.js is mainly used to steal browser data, such as plug-in wallet data, account passwords saved by the browser, etc.:

(test.js code part fragment)

Decrypt (fragment):

Finally, according to our analysis, once the victim runs the code, payload will perform the following operations:

1. Collect system/environment data (home directory, platform, host name, user name, etc.).

2. Send an HTTP request to the remote server to obtain other data or a valid payload.

3. Write the obtained valid payload to the local file system (usually in the home directory).

4. Use Node's child_process.exec to execute these valid payloads.

5. Continue to connect back or “pass back” the system data to the C2 server.

6. Repeat this activity every once in a while to keep the heartbeat package, and try multiple times if the first attempt fails.

7. Secretly monitor user behavior and prepare for stealing crypto assets and other behaviors, such as trying to read a specific directory /Library/Keychains/ (macOS key storage path), stealing SSH private keys, stealing browser plug-in data, and account passwords saved by the browser.

At the same time @blackbigswan found the same user:

https://github[.]com/DavidDev0219

https://github[.]com/vention-dev

https://github[.]com/FortuneTechWorld

https://github[.]com/FortuneTechWorld

https://github[.]com/FortuneTechWorld

The author speculates that it is the same group of attackers and no longer does redundant analysis.

Response suggestions

Attackers usually send malicious files through Telegram, Discord, and LinkedIn. For this type of phishing attack, we propose the following response suggestions from the perspective of users and enterprises:

Users

Beware of suspicious recruitment information or part-time jobs that require downloading or running platform codes such as GitHub, and give priority to verifying the sender's identity through the company's official website and official email address, and avoid believing inducing words such as "limited-time high-paying tasks";

When processing external code, the source of the project and the author background should be strictly reviewed, and unverified high-risk projects should be refused to run unverified high-risk projects. It is recommended to execute suspicious code in a virtual machine or sandbox environment to isolate the risk;

Files received by platforms such as Telegram and DiscordStay alert, disable the automatic download function and manually scan files, beware of malicious script execution requests under the name of "technical testing";

Enable multi-factor authentication and regularly replace high-strength passwords to avoid cross-platform reuse.

Enterprise

regularly organize employees to participate in phishing attack simulation drills to train the ability to identify counterfeit domain names and abnormal requests; deploy email security gateways to intercept malicious attachments; monitor whether sensitive information in the code warehouse is leaked; establish an emergency response mechanism for phishing incidents, and reduce the risk of data leakage and asset loss through a multi-dimensional strategy combining technical protection and personnel awareness.

Keywords: Bitcoin
Share to: