Security News > 2024 > April > Fake job interviews target developers with new Python backdoor
A new campaign tracked as "Dev Popper" is targeting software developers with fake job interviews in an attempt to trick them into installing a Python remote access trojan.
The developers are asked to perform tasks supposedly related to the interview, like downloading and running code from GitHub, in an effort to make the entire process appear legitimate.
Although the perpetrators of the Dev Popper attack aren't known, the tactic of using job lures as bait to infect people with malware is still prevalent, so people should remain vigilant of the risks.
The researchers note that the method "Exploits the developer's professional engagement and trust in the job application process, where refusal to perform the interviewer's actions could compromise the job opportunity," which makes it very effective.
North Korean hackers have been using the "Fake job offer" tactic for multiple operations over the years to compromise their targets over various platforms.
There have been numerous reports last year about North Korean hacking groups using fake job opportunities to connect to and compromise security researchers, media organizations, software developers, or employees of aerospace companies.