LinkedIn Recruitment Phishing Analysis

Author: 23pds & Thinking

background

In recent years, phishing incidents against blockchain engineers have occurred frequently on the LinkedIn platform. Yesterday, we noticed a post posted by @_swader_ on X.This experience is actually a microcosm of the recruitment of blockchain engineers for fishing. Next, let’s analyze this case.

(https://x.com/_swader_/status/1900116168544817589)

process

According to Bruno’s description, a person who claimed to be the project party took the initiative to contact him and sent him a long project introduction:

The content mainly involves recruitment information for a blockchain Socifi game and staking smart contract platform.

Project Overview

This project is a staking smart contract platform based on Socifi games.Core functions include:

• Decentralized exchanges

• game

• Multi-game community features

• NFTs and Tokens

• Live broadcast service

Recruitment intention

• Looking for developers to join the project.

• Backend and smart contract developers have been recruited.

• Recommend Bruno Skvorc as Project Manager/Head of Front-End Development Team.

MVP Design

• The sender provides a Figma design link to the MVP v2 version.

Recruitment process

  • Background check

  • Online programming test

  • Technical Interview

The recruiter was just vague and then started calling Bruno in an attempt to convey a sense of urgency and importance, and immediately provided the repo link: https://bitbucket[.]org/ventionteam/gameplatform/src/main/.

User and the time to submit the code:

Next, we analyze the malicious code.

Skills and tactics

Let’s look at the code description:

So is it true that its real function?

First look at package.json:

No malicious third-party modules were found, and it seems that they were not attacked through malicious NPM packets.We continue to analyze. When we see server.js, if we don’t pay attention, seeing line 47 may end. After all, there seems to be nothing abnormal when we look at it at first glance.

But, pay attention to look at line 46 carefully, what is that?And there are very small horizontal scroll bars, which means there is something on the right!Let’s drag it over and take a look:

This is an encrypted malicious payload. What is its specific function?Let’s look at the code:

(The above picture is part of the code)

This is encrypted code, and more than one layer, base64 encryption.

After running npm start, it will run normally. So what is the use of this payload?

Our virtual machine runs the test (professional operation, please do not imitate).

I found that this attack method is confusing and decrypting is troublesome. We directly caught the C2 link through the Hook method:

Successfully caught the malicious IP:

  • 216.173.115[.]200

  • 95.179.135[.]133

  • 45.59.163[.]56

  • 45.59.1[.]2

  • 5.135.5[.]48

Malicious request: http://216.173.115[.]200:1244/s/bc7302f71ff3.Interestingly, this malicious request actually bypassed the monitoring detection of little snitch.

The attacker downloads and executes the file, two files, test.js and .npl.

The .npl Trojan is mainly used for permission maintenance:

This is what the decoded by .npl:

The above code is used to download a Python program called pay, and the decoded content is as follows:

The attacker uses Python to execute .npl to maintain permissions.

test.js is mainly used to steal browser data, such as plug-in wallet data, account passwords saved by the browser, etc.:

(test.js code part snippet)

Decryption (fragment):

Finally, according to our analysis, once the victim runs the code, payload will do the following:

1. Collect system/environment data (home directory, platform, host name, user name, etc.).

2. Send an HTTP request to the remote server to obtain additional data or a valid payload.

3. Write the obtained valid payload to the local file system (usually in the home directory).

4. Use Node’s child_process.exec to execute these valid payloads.

5. Continue to connect back or “return” system data to the C2 server.

6. Repeat this activity every once in a while to keep the heartbeat pack, and try multiple times if the first attempt fails.

7. Secretly monitor user behavior and prepare for stealing crypto assets, such as trying to read specific directories /Library/Keychains/ (macOS key storage path), stealing SSH private keys, stealing browser plug-in data, and account passwords saved by the browser.

At the same time @blackbigswan found the same user:

  • https://github[.]com/DavidDev0219

  • https://github[.]com/vention-dev

  • https://github[.]com/FortuneTechWorld

The author speculates that it is the same group of attackers and no longer conducts redundant analysis.

Coping suggestions

Attackers usually send malicious files through Telegram, Discord, and LinkedIn. For this type of phishing attack, we propose the following response suggestions from the perspective of users and enterprises:

user

  • Be wary of suspicious recruitment information or part-time jobs that require downloading or running platform codes such as GitHub, and give priority to verifying the sender’s identity through the company’s official website and official email address, and avoid believing inducing techniques such as “limited-time high-paying tasks”;

  • When processing external code, the source of the project and the author background should be strictly reviewed, and unverified high-risk projects should be refused to run unverified high-risk projects. It is recommended to execute suspicious code in a virtual machine or sandbox environment to isolate risks;

  • Be vigilant about files received by platforms such as Telegram and Discord, disable the automatic download function and manually scan files, and be vigilant about malicious script execution requests under the name of “technical testing”;

  • Enable multi-factor authentication and regularly replace high-strength passwords to avoid cross-platform reuse.

enterprise

  • Regularly organize employees to participate in phishing attack simulation drills to train the ability to identify counterfeit domain names and abnormal requests;

  • Deploy email security gateway to block malicious attachments;

  • Monitor whether sensitive information in the code repository is leaked;

  • Establish an emergency response mechanism for phishing incidents, and reduce the risk of data leakage and asset loss through a multi-dimensional strategy combining technical protection and personnel awareness.

  • Related Posts

    “Long -termists’ in the Crypto industry

    Author: dapangdun Long -termists seem to be a very unpleasant word at the moment, because most people in the circle are pursuing “opportunities for getting rich” and “real wealth feedback”.…

    A few minutes of Suetong RGB and RGB ++ protocol design: vernacular manual

    Author: Faust, Geek Web3 & AMP; Btceden.org Lianchuang With the popularity of RGB ++ and related assets, discussions on the principles of RGB and RGB ++ protocols have gradually become…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    From traditional replication to innovation Can Backpack seize the future?

    • By jakiro
    • March 26, 2025
    • 21 views
    From traditional replication to innovation Can Backpack seize the future?

    Saylor’s $200 trillion BTC strategy: U.S. BTC domination and immortality

    • By jakiro
    • March 26, 2025
    • 19 views
    Saylor’s $200 trillion BTC strategy: U.S. BTC domination and immortality

    Ethereum’s two major upgrades to Pectra and Fusaka are explained in detail. What will be brought to ETH?

    • By jakiro
    • March 26, 2025
    • 21 views
    Ethereum’s two major upgrades to Pectra and Fusaka are explained in detail. What will be brought to ETH?

    Coingecko: How do investors view the potential of crypto AI technology?

    • By jakiro
    • March 26, 2025
    • 52 views
    Coingecko: How do investors view the potential of crypto AI technology?

    Galaxy: Research on the current situation of Futarchy governance system and on-chain forecast market

    • By jakiro
    • March 26, 2025
    • 17 views
    Galaxy: Research on the current situation of Futarchy governance system and on-chain forecast market

    The latest updates from ETH and Solana: What are the things to pay attention to?

    • By jakiro
    • March 25, 2025
    • 19 views
    The latest updates from ETH and Solana: What are the things to pay attention to?
    Home
    News
    School
    Search