• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

TronWeekly

Crypto World News

  • Home
  • Education
    • Best TRON Wallets
    • Beginner’s guide to TRON
  • Opinion
    • Tron Tokens
    • Market Analysis
  • Industry
    • Tron Exchange
    • Project Review
  • Press Release
  • Advertise
  • About us
    • The Team
    • Editorial Policy
    • Write for us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • Contact
You are here: Home / News / Crypto Job Scam Nightmare: North Korean RAT Steals Wallets
crypto

Crypto Job Scam Nightmare: North Korean RAT Steals Wallets

June 20, 2025 by Mishal Ali

Key Takeaways:

  • North Korea-linked group Famous Chollima escalates attacks using Python-based “PylangGhost” malware via fraudulent job portals.
  • Victims are lured into downloading malware disguised as video drivers during fake interview tests.
  • Malware extracts data from over 80 browser extensions, including popular crypto wallets and password managers.

Since mid-2024, the North Korean-aligned cybercriminal group Famous Chollima, also tracked as Wagemole, has launched increasingly deceptive campaigns targeting professionals in the crypto industry. These attacks, disguised as employment opportunities, rely on fake job listings at well-known companies such as Coinbase, Robinhood, and Uniswap.

The attackers attract unsuspecting candidates by posing as recruiters offering interviews. Once the user is engaged, they are directed to skill-testing portals, usually built with the React framework and made to resemble official company pages.

Candidates are required to complete tasks and submit personal information, after which they are asked to record a video for the interviewer. At this stage, the website prompts them to grant camera access and execute a malicious command supposedly required to install video drivers.

image 255
Source: Cisco Talos 

Cisco Talos researchers discovered that these commands differ based on the target’s operating system and browser fingerprint. On Windows and macOS, users are shown detailed instructions to install what turns out to be a Trojan payload disguised as a ZIP file. Linux users, however, often encounter an error page, halting the malware installation process.

PylangGhost Replaces GolangGhost in Newer Campaigns

By late 2024, security researchers spotted a Remote Access Trojan tucked inside the final wave of phishing emails; the payload, named GolangGhost, was written in the Go language. Then, in May 2025, Cisco Talos revealed a fresh spin called PylangGhost; it used Python yet behaved almost exactly like its Go predecessor.

PylangGhost springs to life the moment a user runs the right command; that action pulls down a ZIP file packed with the Python malware. Inside sits nvidia.py, which starts the infection by carving out persistence paths in the Windows registry, crafting a unique system ID, and dialing out to its Command and Control server.

image 256
Source: Cisco Talos 

After that, it falls into a message loop, listening and waiting for orders. The RAT is split into six interchangeable modules: auto.py swipes passwords and browser history, api.py talks back using RC4 encryption, and util.py handles file zipping. Experts noted almost identical naming schemes in the Go and Python code, hinting that one team or at least tightly linked groups wrote both versions.

image 258
Source: Cisco Talos 

Credential Theft and Crypto Wallet Targeting

Once it settles on a device, the PylangGhost trojan begins a wide-ranging grab for private information. It can open more than eighty browser add-ons, hunting down cookies, saved passwords, and secret keys.

Among its prized catches are crypto wallets like Metamask, Phantom, and TronLink, plus password vaults such as 1Password and NordPass. With these tokens in hand, crooks can drain digital wallets and pretend to be legitimate users inside corporate accounts.

image 260
Source: Cisco Talos 

Because crypto and security now overlap so closely, this operation highlights a rising brand of money-driven spying. Cisco Talos therefore advises anyone in the crypto space not to run unvetted shell commands and to double-check all work messages, especially those that ask for system-level installs.

Also Read: Australia Shuts Down 95 Firms Linked to Crypto Scams, $35.8M in Losses

Filed Under: News, Crypto Scam Tagged With: Coinbase, crypto scams, Famous Chollima, North Korean RAT, PylangGhost Malware, Robinhood, Uniswap

Primary Sidebar

Recent Posts

  • Pi Network Whale Moves Over 10M Tokens as Price Breaks $0.50 July 12, 2025
  • Shiba Inu Prediction: Can the Community Create a 2x Rally This Month?  July 12, 2025
  • Shiba Inu Price Forecast 2025: Experts See Upside Potential Beyond $0.00002500 July 12, 2025
  • Tether to Drop Support for 5 Blockchains by 2025 in Major Infrastructure Shift July 12, 2025
  • Arbitrum (ARB) Gains Speed Targeting Key $0.50 Resistance July 12, 2025

Footer

News

  • Altcoin News
  • Bitcoin News
  • Blockchain
  • Tron News
  • World

Digest

  • Meet the Founder
  • Price Winning Article
  • DeFi
  • Cyber Security
  • Crypto Scam

Industry

  • Project Review
  • Technology
  • Fintech
  • Tron Exchange
  • New in Town

Tron Universe

  • Event and Tron Parties
  • New in Town
  • Tron Tokens

Follow Us

Subscribe US

Copyright © 2025 · Tron Weekly. All Rights Reserved. NOTE: Tron Weekly is an independent crypto news site that adheres to the strict journalism policy anchored on transparency, trust, and objectivity, we have no affiliation with the TRON Foundation, its founder Justin Sun or any other cryptocurrency firm.