Known Scams
Threat intelligence database. Lazarus Group / DPRK targeting developers.
Scammer GitHub Accounts
Fake LinkedIn Recruiters
Identities stolen by scammers. Real people are not responsible.
Malicious Repositories
Fake Interview Platforms
Impersonating Willo and others to install malware as “camera drivers”.
C2 / Exfiltration Domains
Command-and-control servers where stolen data is sent.
How the Scam Works
Recruiter contacts you on LinkedIn
Fake recruiter with attractive crypto/Web3 job. Profile looks legit. Sometimes deepfake video — ask them to blink.
Sends a "technical assessment"
GitHub/Bitbucket repo to complete. Uses Google Docs or Notion pages to appear legitimate.
Victim runs npm install
Malicious preinstall/postinstall scripts, poisoned configs, or .vscode/tasks.json that auto-runs on folder open.
BeaverTail + InvisibleFerret
BeaverTail steals browser creds & wallets. InvisibleFerret installs persistent backdoor. Attribution: Lazarus Group / DPRK.
Attribution & Sources
Lazarus Group / BlueNoroff / APT38 (DPRK state-sponsored). Campaigns: Contagious Interview, Dangerous Password. Connected to billion-dollar crypto thefts.