North Korean job scammers target JavaScript and Python developers with fake interview tasks that spread malware


  • Lazarus Group develops Operation Dream Job campaign to target Web3 developers
  • New “Graphalgo” variant uses malicious dependencies in legitimate bare-bones projects on PyPI/npm
  • ReversingLabs found ~200 malicious packages that spoofed libraries like graphlib for the purpose of stealing crypto

The infamous Lazarus gang is evolving its Operation Dream Job campaign to target even more software developers and steal even more crypto along the way.

Security researchers ReversingLabs claim to have seen changes to the May 2025 campaign, dubbed ‘Graphalgo’, which sees Lazarus take a legitimate bare-bones project and add a malicious dependency that they use in the attack.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top