North Korean Job Scammers Target JavaScript and Python Developers with Fake Interview Tasks, Spread Malware



  • Lazarus Group develops Operation Dream Job campaign to target Web3 developers
  • New “Graphalgo” variant uses malicious dependencies in legitimate core projects in PyPI/npm
  • ReversingLabs found ~200 malicious packages spoofing libraries like Graphlib, aiming to steal cryptocurrency

The notorious Lazarus gang is evolving its Operation Dream Job campaign to target even more software developers and steal even more cryptocurrencies along the way.

Security researchers ReversingLabs claim to have seen changes to the campaign starting in May 2025, dubbed ‘Graphalgo’, in which Lazarus takes a legitimate core project and adds a malicious dependency that they use in the attack.



Leave a Comment

Your email address will not be published. Required fields are marked *