๐Ÿšจ ๐—ก๐—ผ๐—ฟ๐˜๐—ต ๐—ž๐—ผ๐—ฟ๐—ฒ๐—ฎ ๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜๐˜€ ๐—–๐—ฟ๐˜†๐—ฝ๐˜๐—ผ ๐—๐—ผ๐—ฏ ๐—›๐˜‚๐—ป๐˜๐—ฒ๐—ฟ๐˜€ ๐—ช๐—ถ๐˜๐—ต ๐—ก๐—ฒ๐˜„ โ€˜๐—ฃ๐˜†๐—น๐—ฎ๐—ป๐—ด๐—š๐—ต๐—ผ๐˜€๐˜โ€™ ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ

๐Ÿง  A North Korean-linked hacking group, Famous Chollima (aka Wagemole), has launched a dangerous new Python-based malware named PylangGhost, specifically targeting crypto professionals and job seekers, especially in India.

๐Ÿ” How It Works:

Poses as recruiters from legit companies like Coinbase, Robinhood, Uniswap

Sends fake job offers and directs users to phony interview platforms

Tricks victims into installing fake โ€œvideo driversโ€ that actually execute malware

๐Ÿงจ What PylangGhost Can Do:

Steals passwords, cookies, wallet credentials from 80+ browser extensions (MetaMask, Phantom, 1Password, TronLink, etc.)

Records screenshots, manages files, and maintains remote access for long-term spying

Gives hackers full control of infected systems

๐Ÿ’ฌ Cisco Talos confirms the malware is not AI-generated and closely resembles a prior RAT called GolangGhost.

โš ๏ธ This isnโ€™t the first time North Korean groups have used fake job scams โ€” similar tricks were used in the massive $1.4B Bybit hack earlier this year.

๐Ÿ›ก๏ธ Stay Safe: Avoid downloading files or enabling system access during online job interviews. Always verify recruiter identities and domain links.

#CryptoNews

$BTC

$ETH

$SOL