Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 21, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 21, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 21, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 21, 2025

      Google DeepMind’s CEO says Gemini’s upgrades could lead to AGI — but he still thinks society isn’t “ready for it”

      May 21, 2025

      Windows 11 is getting AI Actions in File Explorer — here’s how to try them right now

      May 21, 2025

      Is The Alters on Game Pass?

      May 21, 2025

      I asked Copilot’s AI to predict the outcome of the Europa League final, and now I’m just sad

      May 21, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Celebrating GAAD by Committing to Universal Design: Equitable Use

      May 21, 2025
      Recent

      Celebrating GAAD by Committing to Universal Design: Equitable Use

      May 21, 2025

      GAAD and Universal Design in Healthcare – A Deeper Look

      May 21, 2025

      GAAD and Universal Design in Pharmacy – A Deeper Look

      May 21, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Google DeepMind’s CEO says Gemini’s upgrades could lead to AGI — but he still thinks society isn’t “ready for it”

      May 21, 2025
      Recent

      Google DeepMind’s CEO says Gemini’s upgrades could lead to AGI — but he still thinks society isn’t “ready for it”

      May 21, 2025

      Windows 11 is getting AI Actions in File Explorer — here’s how to try them right now

      May 21, 2025

      Is The Alters on Game Pass?

      May 21, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Fake Hiring Challenge for Developers Steals Sensitive Data

    Fake Hiring Challenge for Developers Steals Sensitive Data

    March 24, 2025

    Fake Hiring Challenge for Developers: Infection Chain

    Cyble threat intelligence researchers have uncovered a GitHub repository masquerading as a hiring coding challenge that tricks developers into downloading a backdoor to steal sensitive data.

    The campaign uses a number of unusual techniques, such as using a social media profile for command and control (C&C) activities instead of C&C servers.

    There is evidence that the campaign may be expanding beyond a fake hiring challenge for developers, as Cyble Research and Intelligence Labs (CRIL) researchers also found invoice-themed lures.

    Fake Hiring Challenge Targets Polish Developers

    The Cyble researchers said in a blog post that the campaign appears to target Polish-speaking developers, and the malware uses geofencing to restrict execution. The researchers speculated that the campaign is delivered via job platforms like LinkedIn or regional developer forums.

    The fake recruitment test, named “FizzBuzz,“ is used to trick victims into downloading an ISO file containing a JavaScript exercise and a malicious LNK shortcut. When executed, the LNK file (“README.lnk”) runs a PowerShell script that installs a stealthy backdoor dubbed “FogDoor” by the researchers.

    “This backdoor is designed for persistence, data theft, and remote command execution while avoiding detection,” Cyble wrote.

    Instead of using C&C servers, FogDoor communicates with a social media platform via a Dead Drop Resolver (DDR) technique, retrieving attack commands from a social media profile, the researchers said.

    The malware uses geofencing to restrict execution to Polish victims. Once active, “it systematically steals browser cookies, Wi-Fi credentials, and system data, staging them for exfiltration before deleting traces,” Cyble said.

    The malware uses remote debugging to steal Chrome cookies and can operate in background mode, while Firefox credentials are taken from profile directories.

    PowerShell Script Establishes Persistence

    The PowerShell script also opens a “README.txt” file “to mislead users into believing they are interacting with a harmless file,” Cyble said.

    That document contains instructions for a code bug fix task, “making it appear harmless while ensuring the PowerShell script executes only once on the victim’s machine to carry out malicious activities.”

    The PowerShell script also downloads an executable file and saves it as “SkyWatchWeather.exe” in the “C:UsersPublicDownloads” folder and creates a scheduled task named “Weather Widget,” which executes the downloaded file using mshta.exe and VBScript and is set to run every two minutes indefinitely.

    SkyWatchWeather.exe acts as a backdoor by using a social media platform (bark.lgbt) and a temporary webhook service (webhookbin.net) as its C&C infrastructure. After verifying location, the malware attempts to establish a connection with “bark.lgbt/api” to await further commands, which are embedded within the profile information of a social media platform. That setup also makes detection and takedown efforts more challenging, Cyble said.

    Stopping Hiring Scams and Cyberattacks

    The researchers had a number of recommendations for protecting against FizzBuzz, FogDoor and similar attacks, such as:

    • Cross-checking job offers and coding challenges from unverified sources
    • Refraining from downloading and running files from unknown repositories, particularly ISO images and script files
    • Restricting the execution of PowerShell, JavaScript and other scripting languages unless explicitly required, and using application whitelisting
    • Monitoring outbound connections to uncommon domains or file-sharing services
    • Protecting browser-stored credentials with multi-factor authentication (MFA) and password managers.

    The full Cyble blog contains deeper analysis of the campaign and includes Yara and Sigma detection rules, indicators of compromise (IoCs) and MITRE ATT&CK techniques.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMongoDB Atlas Expands Cloud Availability to Mexico
    Next Article Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 22, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-3111 – GitLab Kubernetes Denial of Service Vulnerability

    May 22, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Deploy DeepSeek-R1 distilled models on Amazon SageMaker using a Large Model Inference container

    Machine Learning

    Creativity Hasn’t Left Web Design – It’s Just Different

    Development

    Get error (Illegal query expression: must be surrounded with curly brackets) while trying to fetch details about test-set in QC ALM Rest api

    Development

    5 ways to escape middle management and fast-track your journey to the top

    News & Updates

    Highlights

    GenAI has just made usability testing the most valuable research method

    December 28, 2024

    Generative AI has just put usability testing insights into the center of product development. Source:…

    REBEL: A Reinforcement Learning RL Algorithm that Reduces the Problem of RL to Solving a Sequence of Relative Reward Regression Problems on Iteratively Collected Datasets

    April 30, 2024

    Is there a way to put an entire part of a request in a SoapUI variable?

    June 27, 2024

    Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

    May 19, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.