Menu

North Korea’s State-Run “Lazarus” Cybercrime Org Victimizes Coinbase Job-Hunters with Advanced Phishing Attack

The News: North Korea’s state-backed cybercrime workforce (aka Lazarus) just can’t quit its pet-approach to phishing attacks; Posting bogus opportunities on job boards – this time targeting would-be employees for the crypto giant Coinbase. For their part, Apple, whose M1 chips were vulnerable to the attacks, took swift action to revoke the certificate which enabled the malware to execute.

Cybersecurity software producer ESET first sounded the alarm on Twitter after their research arm learned that a Mac executable disguised as a job opportunity had been uploaded to VirusTotal. Read more about the threat from DarkReading.

With Coinbase Scam, Lazarus Takes Aim at Tech Savvy Job Seekers

Coinbase Scam Tweet

Read the full thread on Twitter

Analyst Take: ESET’s research arm has been closely watching the Pariah state’s Operation In(ter)ception since early 2020 when it found evidence of attacks against military and aerospace companies. At the time they produced an extensive white paper on the topic and concluded that North Korea’s main goal for the malware was espionage. The group was already placing a file titled “Interception.dll” to draw in victims with completely fabricated, though convincing, job opportunities via LinkedIn and other popular job-search sites.

According to ESET’s Twitter thread, the newest iteration of Operation In(ter)ception malware can penetrate both Intel and Mac Silicon. The cybersecurity giant warned of three files left by the malware: a decoy PDF document Coinbase_online_careers_2022_07.pdf, a bundle http://FinderFontsUpdater.app, and a downloader safarifontagent. The Twitter thread goes on to break down each element of the program and how they work together to gain access and information.

It may seem ironic that folks who are seeking positions at a large tech company would be so easily victimized by a phishing expedition, but there’s a method to the madness.

Apple Closed a Major Loophole OSX Users but the Threat Remains Active

In order to hoodwink relatively tech-savvy job seekers, it’s likely that the attackers were in direct contact with their victims, Peter Kalnai, a senior malware researcher for ESET, told DarkReading. “The victim was probably instructed to click whatever popup windows showed up in order to see the ‘dream job’ offer from Coinbase.”

“The certificate has been revoked, so it’s not possible to execute it until the user adds it to allowed applications,” continued Kalnai, stating that Mac users running OSX Catalina or later now had some level of protection from the malware’s current iteration. But before you breathe too easy, consider Kalnai’s description of the advanced nature of Lazarus operations: “This remains a threat when the attackers start to be convincing enough to trick the victim to overcome those obstacles with execution.”

Government Cybersecurity Experts Keep Cautious Eye on Lazarus’ Rapid Growth

Kalnai isn’t alone in his concern. Former White House Senior Director of Cybersecurity Policy, Andrew Grotto, who held the role in both the Obama and Trump administrations and now directs Stanford’s Center for International Security and Cooperation also escalated the alarm, warning that North Korea’s ability to execute high-level cyberattacks had very quickly gone from an “aspiring antagonist” to successfully positioning itself as “a [if not the] top, cyber operators when it comes to high-end potential crimes.”

Disclosure: Futurum Research is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of Futurum Research as a whole.

Other insights from Futurum Research:

Microsoft Issues Warning on Large Scale Phishing-as-a-Service Operation 

TeleSign Silent Verification Service Launches, Designed to Reduce Multi-Factor Authentication Headaches for Mobile Users

Google’s Cybersecurity Efforts to Include Mobile Devices as Security Keys

Image Credit: Phys.org

Author Information

Shelly Kramer is a serial entrepreneur with a technology-centric focus. She has worked alongside some of the world’s largest brands to embrace disruption and spur innovation, understand and address the realities of the connected customer, and help navigate the process of digital transformation.

Related Insights
OpenAI Frontier Close the Enterprise AI Opportunity Gap—or Widen It
February 9, 2026

OpenAI Frontier: Close the Enterprise AI Opportunity Gap—or Widen It?

Futurum Research Analysts Mitch Ashley, Keith Kirkpatrick, Fernando Montenegro, Nick Patience, and Brad Shimmin examine OpenAI Frontier and whether enterprise AI agents can finally move from pilots to production. The...
Commvault Introduces Geo Shield. Can One Platform Meet Sovereign Needs?
February 9, 2026

Commvault Introduces Geo Shield. Can One Platform Meet Sovereign Needs?

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, examines Commvault Geo Shield and its focus on sovereign deployment models that retain control over data location, operations,...
Is 2026 the Turning Point for Industrial-Scale Agentic AI?
February 5, 2026

Is 2026 the Turning Point for Industrial-Scale Agentic AI?

VP and Practice Lead Fernando Montenegro shares insights from the Cisco AI Summit 2026, where leaders from the major AI ecosystem providers gathered to discuss bridging the AI ROI gap...
Cisco’s "End of Gold": A High-Stakes Pivot to Skills-First Architecture
February 3, 2026

Cisco’s “End of Gold”: A High-Stakes Pivot to Skills-First Architecture

Tiffani Bova, Chief Strategy and Research Officer at The Futurum Group, examines Cisco’s 360 Partner Program and how its redesigned incentives, designations, and tools aim to align partner profitability with...
ServiceNow Q4 FY 2025 Earnings Highlight AI Platform Momentum
January 30, 2026

ServiceNow Q4 FY 2025 Earnings Highlight AI Platform Momentum

Futurum Research analyzes ServiceNow’s Q4 FY 2025 results, highlighting AI agent monetization, platform consolidation in CRM/CPQ, and a security stack aimed at scaling agentic AI across governed workflows heading into...
Microsoft Q2 FY 2026 Cloud Surpasses $50B; Azure Up 38% CC
January 30, 2026

Microsoft Q2 FY 2026: Cloud Surpasses $50B; Azure Up 38% CC

Futurum Research analyzes Microsoft’s Q2 FY 2026 earnings, highlighting AI-led cloud demand, agent platform traction, and Copilot adoption amid record capex and a substantially expanded commercial backlog....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.