Slow Pisces Hackers Target Developers with Malicious Python Coding Tests

Cybersecurity researchers have uncovered a sophisticated campaign by North Korean state-sponsored threat actors targeting cryptocurrency developers with malicious coding challenges.

According to a report released today by Palo Alto Networks’ Unit 42, the group known as Slow Pisces (also tracked as Jade Sleet, TraderTraitor, and PUKCHONG) has been engaging in social engineering attacks via LinkedIn, posing as recruiters to deliver custom malware.

Deceptive Recruitment Strategy

The threat actors begin by approaching cryptocurrency developers on LinkedIn with job opportunities, sending benign PDF files containing job descriptions.

If targets respond positively, they receive coding challenges that direct them to GitHub repositories containing malicious code.

These repositories appear legitimate, often adapted from actual open-source projects such as cryptocurrency dashboards or stock market analyzers.

While most of the code functions normally, the repositories contain concealed malicious components that connect to command-and-control servers operated by the attackers.

“Slow Pisces stands out from their peers’ campaigns in operational security.

Delivery of payloads at each stage is heavily guarded, existing in memory only.

And the group’s later stage tooling is only deployed when necessary,” notes the report.

Advanced Technical Techniques

The attackers employ sophisticated methods to hide their malicious activities, including YAML deserialization in Python repositories and EJS escape function techniques in JavaScript projects.

These methods allow them to execute arbitrary code while evading detection.

When targeting Python developers, Slow Pisces delivers malware that researchers have named “RN Loader” and “RN Stealer.”

The RN Stealer payload is designed to extract sensitive information from victims’ machines, including:

  • Login credentials from macOS keychain databases
  • SSH keys
  • Configuration files for cloud services like AWS and Google Cloud
  • Directory listings and contents of victims’ home directories1

Financial Impact and Attribution

The group reportedly stole over $1 billion from cryptocurrency organizations in 2023 alone.

Most recently, they’ve been linked to the theft of $1.5 billion from a Dubai cryptocurrency exchange.

The FBI previously attributed a $308 million theft from a Japan-based cryptocurrency company to the same group.

Palo Alto Networks has shared their findings with GitHub and LinkedIn, who have removed the malicious accounts.

They’ve also disclosed indicators of compromise to help organizations detect and mitigate similar attacks.

Indicators of Compromise

DomainIP AddressFirst SeenLast SeenRepository Type
getstockprice[.]com70.34.245[.]1182025-02-032025-02-20Python
cdn[.]clubinfo[.]io5.206.227[.]512025-01-212025-02-19Python
update[.]jquerycloud[.]io192.236.199[.]572024-07-032024-08-22JavaScript
en[.]stockslab[.]org91.103.140[.]1912024-08-192024-09-12Python
api[.]coinpricehub[.]io45.141.58[.]402024-05-062024-08-06Java

Security experts recommend the strict segregation of corporate and personal devices as the most effective mitigation against such targeted social engineering campaigns.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here