Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

clickFix: The Insidious North Korean Click-Fix Attacks Targeting Crypto Firms




In a disturbing turn of events, North Korean hackers have adopted ClickFix attacks to compromise cryptocurrency firms. The Lazarus group's latest campaign serves as a stark reminder of the ever-present threat posed by North Korean cyber-attacks. Stay informed and take proactive steps to protect yourself against these insidious tactics.

  • The Lazarus hacking group has adopted 'ClickFix' tactics to compromise the security of cryptocurrency firms, as reported by Sekoia, a cybersecurity firm.
  • The ClickFix tactic involves creating fake error messages on websites or documents, prompting users to run malware commands that download and execute malware on their systems.
  • The Lazarus group has impersonated numerous well-known companies in the cryptocurrency sector, including Coinbase, KuCoin, Kraken, and others, to lure victims into downloading and running malware.
  • The malware used in these attacks, 'GolangGhost', can perform file operations, shell command execution, steal user data, and harvest system metadata.
  • Organizations operating in the cryptocurrency sector should prioritize implementing robust security measures, including regular software updates, secure authentication protocols, and network segmentation.



  • North Korea, a nation infamous for its nefarious cyber-attacks, has once again demonstrated its prowess in the realm of digital deception. In recent months, reports have surfaced of the notorious Lazarus hacking group adopting 'ClickFix' tactics to compromise the security of cryptocurrency firms. This latest development serves as a chilling reminder of the ever-evolving threat landscape and the imperative for crypto enthusiasts and businesses alike to remain vigilant.

    According to a report by Sekoia, a cybersecurity firm that specializes in identifying and mitigating complex threats, the Lazarus group has been utilizing the ClickFix technique to spread malware across various platforms. This campaign is seen as an evolution of the group's 'Contagious Interview' campaign, which similarly targets job seekers in the AI and cryptocurrency space.

    The ClickFix tactic involves the creation of fake error messages on websites or documents, prompting users to "fix" the issue by running PowerShell commands that download and execute malware on their systems. In this case, the Lazarus group has impersonated numerous well-known companies in the cryptocurrency sector, including Coinbase, KuCoin, Kraken, Circle, Securitize, BlockFi, Tether, Robinhood, and Bybit, all of which have been the target of recent high-profile heists.

    Sekoia's analysis indicates that the Lazarus group has employed this tactic to lure victims into downloading and running malware loaders on their systems, dropping info-stealers. The researchers noted that 14 companies were used as lures in the fake interview websites identified by Sekoia.

    The ClickFix attacks are notable for their use of OS-specific instructions, supporting either Windows or macOS, to deliver a Go-based backdoor named 'GolangGhost'. Once deployed, GolangGhost connects to its command and control (C2) server, registers the newly infected device with a unique machine ID, and waits for commands. The malware can perform file operations, shell command execution, steal Chrome cookies, browsing history, and stored passwords, as well as harvest system metadata.

    This development serves as a stark reminder of the ever-present threat posed by North Korean cyber-attacks. In recent years, the Lazarus group has been linked to several high-profile incidents, including the $1.5 billion heist on Bybit and numerous instances of cryptocurrency theft.

    The implications of this campaign are far-reaching, underscoring the importance of robust cybersecurity measures for organizations operating in the cryptocurrency sector. As Sekoia notes, "Never execute anything you have copied from the internet on the Windows Command Prompt or macOS Terminal, especially if you don't fully understand what it does."

    In addition to the recommendations provided by Sekoia, several other steps can be taken to mitigate the risk of ClickFix attacks:

    1. **Stay informed:** Organizations and individuals should stay up-to-date with the latest developments in cybersecurity and remain vigilant for any suspicious activity.
    2. **Implement robust security measures:** Organizations operating in the cryptocurrency sector should prioritize implementing robust security measures, including regular software updates, secure authentication protocols, and network segmentation.
    3. **Verify interview invitations:** Individuals receiving job offers or other communication should verify the authenticity of these messages before engaging with them.
    4. **Use reputable tools:** The use of reputable tools, such as antivirus software and anti-malware programs, can help protect against ClickFix attacks.

    In conclusion, the adoption of ClickFix tactics by the Lazarus group highlights the ever-present threat posed by North Korean cyber-attacks. As we move forward in an increasingly complex and interconnected world, it is imperative that individuals and organizations prioritize robust cybersecurity measures to mitigate these risks.


    In a disturbing turn of events, North Korean hackers have adopted ClickFix attacks to compromise cryptocurrency firms. The Lazarus group's latest campaign serves as a stark reminder of the ever-present threat posed by North Korean cyber-attacks. Stay informed and take proactive steps to protect yourself against these insidious tactics.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/-clickFix-The-Insidious-North-Korean-Click-Fix-Attacks-Targeting-Crypto-Firms--ehn.shtml

  • https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/

  • https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html

  • https://www.cpomagazine.com/cyber-security/north-korean-hackers-use-clickfix-social-engineering-tactic-to-conduct-cyber-espionage/

  • https://www.infosecinstitute.com/resources/malware-analysis/lazaruss-vhd-ransomware-malware-spotlight/

  • https://cybersecuritynews.com/lazarus-hackers-altering-legitimate-software-packages/

  • https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape

  • https://cyberresilience.com/threatonomics/understanding-the-clickfix-attack/

  • https://attack.mitre.org/groups/G0032/

  • https://en.wikipedia.org/wiki/Lazarus_Group


  • Published: Mon Mar 31 11:23:17 2025 by llama3.2 3B Q4_K_M








    Sign up for our newsletter!








     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News 2025. All rights reserved.

    Privacy | Terms of Use | Contact Us