WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

866

Never, Ever, download and run shit you don't know what it does. Especially for a job interview. If you "must", setup a VM or a special system just for that and wipe it after every use.

Archive: https://archive.today/Es0jo

From the post:

>A new campaign tracked as "Dev Popper" is targeting software developers with fake job interviews in an attempt to trick them into installing a Python remote access trojan (RAT). The developers are asked to perform tasks supposedly related to the interview, like downloading and running code from GitHub, in an effort to make the entire process appear legitimate. However, the threat actor's goal is make their targets download malicious software that gathers system information and enables remote access to the host. According to Securonix analysts, the campaign is likely orchestrated by North Korean threat actors based on the observed tactics. The connections are not strong enough for attribution, though. [...]

Never, Ever, download and run shit you don't know what it does. Especially for a job interview. If you "must", setup a VM or a special system just for that and wipe it after every use. Archive: https://archive.today/Es0jo From the post: >>A new campaign tracked as "Dev Popper" is targeting software developers with fake job interviews in an attempt to trick them into installing a Python remote access trojan (RAT). The developers are asked to perform tasks supposedly related to the interview, like downloading and running code from GitHub, in an effort to make the entire process appear legitimate. However, the threat actor's goal is make their targets download malicious software that gathers system information and enables remote access to the host. According to Securonix analysts, the campaign is likely orchestrated by North Korean threat actors based on the observed tactics. The connections are not strong enough for attribution, though. [...]

(post is archived)