Famous Chollima deploying Python version of GolangGhost RAT
In May 2025, Cisco Talos identified a Python-based remote access trojan (RAT) called 'PylangGhost', used by a North Korean-aligned threat actor. PylangGhost shares similarities with the previously documented GolangGhost RAT. The threat actor, Famous Chollima, has been targeting employees with experience in cryptocurrency and blockchain technologies through fake job interview sites. The attacks primarily affect users in India. The malware is deployed through a two-stage process involving fake skill-testing pages and malicious command execution. PylangGhost consists of six Python modules and offers functionalities similar to its Golang counterpart, including system information collection, file manipulation, and browser data theft from over 80 extensions.
AI Analysis
Technical Summary
In May 2025, Cisco Talos identified a new Python-based remote access trojan (RAT) named 'PylangGhost,' deployed by the North Korean-aligned threat actor group Famous Chollima. This malware is a variant of the previously known GolangGhost RAT, re-implemented in Python to potentially increase flexibility and evade detection. PylangGhost targets individuals with expertise in cryptocurrency and blockchain technologies, primarily through social engineering tactics involving fake job interview websites. The infection chain is a two-stage process: initially, victims are lured to skill-testing pages designed to appear legitimate, which then trigger malicious command execution to deploy the RAT. Technically, PylangGhost is modular, comprising six Python modules that collectively provide capabilities such as system information gathering, file manipulation, and extensive browser data theft. Notably, it can extract data from over 80 browser extensions, which is significant given the sensitive information often stored or accessible via these extensions, including cryptocurrency wallets and authentication tokens. The malware leverages multiple MITRE ATT&CK techniques, including scheduled task execution (T1053.005), system information discovery (T1082), credential access (T1555), and command and scripting interpreter usage (T1059.001 and T1059.006), among others. This indicates a sophisticated approach to persistence, reconnaissance, and data exfiltration. The campaign currently primarily affects users in India, focusing on blockchain and cryptocurrency professionals, but the modular and Python-based nature of the RAT suggests potential adaptability to other environments and targets. There are no known exploits in the wild associated with this malware, and no specific affected software versions have been identified. The threat actor's use of fake job portals as a vector highlights a targeted social engineering approach rather than broad exploitation of software vulnerabilities.
Potential Impact
For European organizations, the impact of PylangGhost could be significant, especially for entities involved in blockchain, cryptocurrency, fintech, and related sectors. The malware's capability to steal browser data from numerous extensions poses a direct threat to the confidentiality of sensitive credentials, private keys, and session tokens, potentially leading to financial theft, unauthorized access, and further lateral movement within networks. The system information gathering and file manipulation functionalities could facilitate espionage, data exfiltration, and disruption of operations. Although the current campaign targets individuals in India, European professionals with similar profiles or working in multinational companies with blockchain interests could be targeted in future campaigns. Additionally, the use of Python modules makes detection more challenging in environments relying heavily on signature-based detection, increasing the risk of prolonged undetected presence. The social engineering vector also underscores the risk of insider compromise or credential theft, which could cascade into broader organizational impacts.
Mitigation Recommendations
To mitigate the risk posed by PylangGhost, European organizations should implement targeted measures beyond generic advice: 1. Enhance Email and Web Filtering: Deploy advanced filtering solutions capable of detecting and blocking phishing sites, especially those masquerading as job portals or skill-testing platforms related to blockchain and cryptocurrency. 2. User Awareness Training: Conduct specialized training for employees in blockchain and cryptocurrency roles to recognize social engineering tactics, particularly fake job offers and interview processes. 3. Application Whitelisting and Execution Control: Restrict execution of unauthorized Python scripts and modules, especially from user directories or temporary locations, using application control policies. 4. Monitor for MITRE ATT&CK Techniques: Implement detection rules for behaviors such as scheduled task creation (T1053.005), credential dumping (T1555), and suspicious command interpreter usage (T1059.001/006). 5. Browser Extension Management: Audit and limit browser extensions to only those necessary, and monitor for unusual access patterns or data exfiltration attempts related to extensions. 6. Network Segmentation and Egress Monitoring: Segment networks to limit lateral movement and monitor outbound traffic for anomalous connections indicative of data exfiltration. 7. Incident Response Preparedness: Develop playbooks specific to RAT infections, including forensic analysis of Python modules and containment strategies. 8. Threat Intelligence Sharing: Engage with European cybersecurity communities to share indicators and tactics related to Famous Chollima and PylangGhost to enhance collective defense.
Affected Countries
Germany, United Kingdom, France, Netherlands, Switzerland, Estonia
Indicators of Compromise
- hash: 09b93b77c9f7c28151aca977d95eaa13
- hash: be20cf6b1ebe922a8076245112307e86e615523d
- hash: 0d14960395a9d396d413c2160570116e835f8b3200033a0e4e150f5e50b68bec
- hash: 0ec9d355f482a292990055a9074fdabdb75d72630b920a61bdf387f2826f5385
- hash: 127406b838228c39b368faa9d6903e7e712105b5ad8f43a987a99f7b10c29780
- hash: 1f482ce7e736a8541cc16e3e80c7890d13fb1f561ae38215a98a75dce1333cee
- hash: 267009d555f59e9bf5d82be8a046427f04a16d15c63d9c7ecca749b11d8c8fc3
- hash: 28198494f0ed5033085615a57573e3d748af19e4bd6ea215893ebeacf6e576df
- hash: 5273d68b3aef1f5ebf420b91d66a064e34c4d3495332fd492fecb7ef4b19624e
- hash: 7ac3ffb78ae1d2d9b5d3d336d2a2409bd8f2f15f5fb371a1337dd487bd471e32
- hash: 8ead05bb10e6ab0627fcb3dd5baa59cdaab79aa3522a38dad0b7f1bc0dada10a
- hash: 929c69827cd2b03e7b03f9a53c08268ab37c29ac4bd1b23425f66a62ad74a13b
- hash: a206ea9b415a0eafd731b4eec762a5b5e8df8d9007e93046029d83316989790a
- hash: b7ab674c5ce421d9233577806343fc95602ba5385aa4624b42ebd3af6e97d3e5
- hash: b8402db19371db55eebea08cf1c1af984c3786d03ff7eae954de98a5c1186cee
- hash: c2137cd870de0af6662f56c97d27b86004f47b866ab27190a97bde7518a9ac1b
- hash: c2d2320ae43aaa0798cbcec163a0265cba511f8d42d90d45cd49a43fe1c40be6
- hash: d029be4142fca334af8fe0f5f467a0e0e1c89d3b881833ee53c1e804dc912cfd
- hash: d3500266325555c9e777a4c585afc05dfd73b4cbe9dba741c5876593b78059fd
- hash: e7c2b524f5cb0761a973accc9a4163294d678f5ce6aca73a94d4e106f4c8fea4
- hash: ed170975e3fd03440360628f447110e016f176a44f951fcf6bc8cdb47fbd8e0e
- hash: fb5362c4540a3cbff8cb1c678c00cc39801dc38151edc4a953e66ade3e069225
- hash: fc71a1df2bb4ac2a1cc3f306c3bdf0d754b9fab6d1ac78e4eceba5c6e7aee85d
- domain: assesstrack.com
- domain: digitaltalent.review
- domain: evalassesso.com
- domain: evalswift.com
- domain: fast-video-recording.com
- domain: krakenhire.com
- domain: livetalentpro.com
- domain: provevidskillcheck.com
- domain: quantumnodespro.com
- domain: quiz-nest.com
- domain: talent-hiringtalk.com
- domain: api.auto-fixer.online
- domain: api.autocamfixer.online
- domain: api.autodriverfix.online
- domain: api.camdriversupport.com
- domain: api.camera-drive.org
- domain: api.camtechdrivers.com
- domain: api.camtuneup.online
- domain: api.drive-release.cloud
- domain: api.drivercams.cloud
- domain: api.driversofthub.online
- domain: api.fixdiskpro.online
- domain: api.nvidia-drive.cloud
- domain: api.nvidia-release.org
- domain: api.nvidia-release.us
- domain: api.quickcamfix.online
- domain: api.quickdriverupdate.online
- domain: api.smartdriverfix.cloud
- domain: api.vcamfixer.online
- domain: api.web-cam.cloud
- domain: coinbase.talenthiringtool.com
- domain: coinbase.talentmonitoringtool.com
- domain: crosstheages.skillence360.com
- domain: doodles.skillquestions.com
- domain: kraken.livehiringpro.com
- domain: parallel.eskillora.com
- domain: parallel.eskillprov.com
- domain: robinhood.ecareerscan.com
- domain: skill.vidintermaster.com
- domain: uniswap.prehireiq.com
- domain: uniswap.speakure.com
- domain: uniswap.testforhire.com
- domain: www.hireviavideo.com
- domain: www.smartvideohire.com
- domain: www.talent-hiringstep.com
- domain: yuga.skillquestions.com
Famous Chollima deploying Python version of GolangGhost RAT
Description
In May 2025, Cisco Talos identified a Python-based remote access trojan (RAT) called 'PylangGhost', used by a North Korean-aligned threat actor. PylangGhost shares similarities with the previously documented GolangGhost RAT. The threat actor, Famous Chollima, has been targeting employees with experience in cryptocurrency and blockchain technologies through fake job interview sites. The attacks primarily affect users in India. The malware is deployed through a two-stage process involving fake skill-testing pages and malicious command execution. PylangGhost consists of six Python modules and offers functionalities similar to its Golang counterpart, including system information collection, file manipulation, and browser data theft from over 80 extensions.
AI-Powered Analysis
Technical Analysis
In May 2025, Cisco Talos identified a new Python-based remote access trojan (RAT) named 'PylangGhost,' deployed by the North Korean-aligned threat actor group Famous Chollima. This malware is a variant of the previously known GolangGhost RAT, re-implemented in Python to potentially increase flexibility and evade detection. PylangGhost targets individuals with expertise in cryptocurrency and blockchain technologies, primarily through social engineering tactics involving fake job interview websites. The infection chain is a two-stage process: initially, victims are lured to skill-testing pages designed to appear legitimate, which then trigger malicious command execution to deploy the RAT. Technically, PylangGhost is modular, comprising six Python modules that collectively provide capabilities such as system information gathering, file manipulation, and extensive browser data theft. Notably, it can extract data from over 80 browser extensions, which is significant given the sensitive information often stored or accessible via these extensions, including cryptocurrency wallets and authentication tokens. The malware leverages multiple MITRE ATT&CK techniques, including scheduled task execution (T1053.005), system information discovery (T1082), credential access (T1555), and command and scripting interpreter usage (T1059.001 and T1059.006), among others. This indicates a sophisticated approach to persistence, reconnaissance, and data exfiltration. The campaign currently primarily affects users in India, focusing on blockchain and cryptocurrency professionals, but the modular and Python-based nature of the RAT suggests potential adaptability to other environments and targets. There are no known exploits in the wild associated with this malware, and no specific affected software versions have been identified. The threat actor's use of fake job portals as a vector highlights a targeted social engineering approach rather than broad exploitation of software vulnerabilities.
Potential Impact
For European organizations, the impact of PylangGhost could be significant, especially for entities involved in blockchain, cryptocurrency, fintech, and related sectors. The malware's capability to steal browser data from numerous extensions poses a direct threat to the confidentiality of sensitive credentials, private keys, and session tokens, potentially leading to financial theft, unauthorized access, and further lateral movement within networks. The system information gathering and file manipulation functionalities could facilitate espionage, data exfiltration, and disruption of operations. Although the current campaign targets individuals in India, European professionals with similar profiles or working in multinational companies with blockchain interests could be targeted in future campaigns. Additionally, the use of Python modules makes detection more challenging in environments relying heavily on signature-based detection, increasing the risk of prolonged undetected presence. The social engineering vector also underscores the risk of insider compromise or credential theft, which could cascade into broader organizational impacts.
Mitigation Recommendations
To mitigate the risk posed by PylangGhost, European organizations should implement targeted measures beyond generic advice: 1. Enhance Email and Web Filtering: Deploy advanced filtering solutions capable of detecting and blocking phishing sites, especially those masquerading as job portals or skill-testing platforms related to blockchain and cryptocurrency. 2. User Awareness Training: Conduct specialized training for employees in blockchain and cryptocurrency roles to recognize social engineering tactics, particularly fake job offers and interview processes. 3. Application Whitelisting and Execution Control: Restrict execution of unauthorized Python scripts and modules, especially from user directories or temporary locations, using application control policies. 4. Monitor for MITRE ATT&CK Techniques: Implement detection rules for behaviors such as scheduled task creation (T1053.005), credential dumping (T1555), and suspicious command interpreter usage (T1059.001/006). 5. Browser Extension Management: Audit and limit browser extensions to only those necessary, and monitor for unusual access patterns or data exfiltration attempts related to extensions. 6. Network Segmentation and Egress Monitoring: Segment networks to limit lateral movement and monitor outbound traffic for anomalous connections indicative of data exfiltration. 7. Incident Response Preparedness: Develop playbooks specific to RAT infections, including forensic analysis of Python modules and containment strategies. 8. Threat Intelligence Sharing: Engage with European cybersecurity communities to share indicators and tactics related to Famous Chollima and PylangGhost to enhance collective defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.talosintelligence.com/python-version-of-golangghost-rat/"]
- Adversary
- Famous Chollima
- Pulse Id
- 6852f50f8e7fb42e2328c1c5
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash09b93b77c9f7c28151aca977d95eaa13 | — | |
hashbe20cf6b1ebe922a8076245112307e86e615523d | — | |
hash0d14960395a9d396d413c2160570116e835f8b3200033a0e4e150f5e50b68bec | — | |
hash0ec9d355f482a292990055a9074fdabdb75d72630b920a61bdf387f2826f5385 | — | |
hash127406b838228c39b368faa9d6903e7e712105b5ad8f43a987a99f7b10c29780 | — | |
hash1f482ce7e736a8541cc16e3e80c7890d13fb1f561ae38215a98a75dce1333cee | — | |
hash267009d555f59e9bf5d82be8a046427f04a16d15c63d9c7ecca749b11d8c8fc3 | — | |
hash28198494f0ed5033085615a57573e3d748af19e4bd6ea215893ebeacf6e576df | — | |
hash5273d68b3aef1f5ebf420b91d66a064e34c4d3495332fd492fecb7ef4b19624e | — | |
hash7ac3ffb78ae1d2d9b5d3d336d2a2409bd8f2f15f5fb371a1337dd487bd471e32 | — | |
hash8ead05bb10e6ab0627fcb3dd5baa59cdaab79aa3522a38dad0b7f1bc0dada10a | — | |
hash929c69827cd2b03e7b03f9a53c08268ab37c29ac4bd1b23425f66a62ad74a13b | — | |
hasha206ea9b415a0eafd731b4eec762a5b5e8df8d9007e93046029d83316989790a | — | |
hashb7ab674c5ce421d9233577806343fc95602ba5385aa4624b42ebd3af6e97d3e5 | — | |
hashb8402db19371db55eebea08cf1c1af984c3786d03ff7eae954de98a5c1186cee | — | |
hashc2137cd870de0af6662f56c97d27b86004f47b866ab27190a97bde7518a9ac1b | — | |
hashc2d2320ae43aaa0798cbcec163a0265cba511f8d42d90d45cd49a43fe1c40be6 | — | |
hashd029be4142fca334af8fe0f5f467a0e0e1c89d3b881833ee53c1e804dc912cfd | — | |
hashd3500266325555c9e777a4c585afc05dfd73b4cbe9dba741c5876593b78059fd | — | |
hashe7c2b524f5cb0761a973accc9a4163294d678f5ce6aca73a94d4e106f4c8fea4 | — | |
hashed170975e3fd03440360628f447110e016f176a44f951fcf6bc8cdb47fbd8e0e | — | |
hashfb5362c4540a3cbff8cb1c678c00cc39801dc38151edc4a953e66ade3e069225 | — | |
hashfc71a1df2bb4ac2a1cc3f306c3bdf0d754b9fab6d1ac78e4eceba5c6e7aee85d | — |
Domain
Value | Description | Copy |
---|---|---|
domainassesstrack.com | — | |
domaindigitaltalent.review | — | |
domainevalassesso.com | — | |
domainevalswift.com | — | |
domainfast-video-recording.com | — | |
domainkrakenhire.com | — | |
domainlivetalentpro.com | — | |
domainprovevidskillcheck.com | — | |
domainquantumnodespro.com | — | |
domainquiz-nest.com | — | |
domaintalent-hiringtalk.com | — | |
domainapi.auto-fixer.online | — | |
domainapi.autocamfixer.online | — | |
domainapi.autodriverfix.online | — | |
domainapi.camdriversupport.com | — | |
domainapi.camera-drive.org | — | |
domainapi.camtechdrivers.com | — | |
domainapi.camtuneup.online | — | |
domainapi.drive-release.cloud | — | |
domainapi.drivercams.cloud | — | |
domainapi.driversofthub.online | — | |
domainapi.fixdiskpro.online | — | |
domainapi.nvidia-drive.cloud | — | |
domainapi.nvidia-release.org | — | |
domainapi.nvidia-release.us | — | |
domainapi.quickcamfix.online | — | |
domainapi.quickdriverupdate.online | — | |
domainapi.smartdriverfix.cloud | — | |
domainapi.vcamfixer.online | — | |
domainapi.web-cam.cloud | — | |
domaincoinbase.talenthiringtool.com | — | |
domaincoinbase.talentmonitoringtool.com | — | |
domaincrosstheages.skillence360.com | — | |
domaindoodles.skillquestions.com | — | |
domainkraken.livehiringpro.com | — | |
domainparallel.eskillora.com | — | |
domainparallel.eskillprov.com | — | |
domainrobinhood.ecareerscan.com | — | |
domainskill.vidintermaster.com | — | |
domainuniswap.prehireiq.com | — | |
domainuniswap.speakure.com | — | |
domainuniswap.testforhire.com | — | |
domainwww.hireviavideo.com | — | |
domainwww.smartvideohire.com | — | |
domainwww.talent-hiringstep.com | — | |
domainyuga.skillquestions.com | — |
Threat ID: 685317a933c7acc046074f60
Added to database: 6/18/2025, 7:46:49 PM
Last enriched: 6/18/2025, 8:02:17 PM
Last updated: 8/17/2025, 11:29:27 PM
Views: 50
Related Threats
Threat Actor Claims to Sell 15.8 Million Plain-Text PayPal Credentials
MediumElastic EDR 0-day: Microsoft-signed driver can be weaponized to attack its own host
MediumEncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw
MediumThreat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.