Skip to content

Lazarus Group Targets Developers in 'Operation 99' Malware Campaign

Protect your code and crypto: Lazarus is after developers. Here's how to stay safe.

In this image we can see halloween image and a text written on the back of the halloween image.
In this image we can see halloween image and a text written on the back of the halloween image.

Lazarus Group Targets Developers in 'Operation 99' Malware Campaign

The Lazarus group, a notorious cybercrime syndicate, has set its sights on software developers in a new campaign, 'Operation 99'. The group aims to steal sensitive data, including source code and cryptocurrency wallet keys, by targeting the developer ecosystem.

The campaign employs a sophisticated, multi-stage malware system with modular components. Attackers pose as recruiters on platforms like LinkedIn to engage with targets. Once hooked, victims are directed to clone a malicious GitLab repository named 'coin promoting Webapp'.

The malware system, featuring enhanced obfuscation and adaptability, exploits security vulnerabilities in developer environments. It steals valuable intellectual property and digital assets, such as source code and secrets. The Lazarus group's tactics have evolved to include targeted attacks on developers in the tech supply chain, highlighting the importance of proactive security measures.

Organizations are advised to bolster their security by implementing enhanced code repository verification and advanced endpoint security solutions. The campaign's specialized focus on freelance developers in the cryptocurrency sector underscores the need for vigilance among all developers.

The Lazarus group's 'Operation 99' campaign underscores the importance of robust security measures within the developer community. With a focus on freelance cryptocurrency developers and the use of sophisticated malware, organizations must adopt proactive strategies to protect their intellectual property and digital assets.

Read also:

Latest