Inside DPRK's Fake Job Platform Targeting U.S. AI Talent
This analysis details a sophisticated DPRK-linked operation called Contagious Interview, which uses a fake job platform to target U.S. AI talent. The campaign mimics legitimate recruitment processes, offering job listings from well-known tech companies to lure victims. The platform, hosted at lenvny[.]com, is designed to appear as a legitimate AI-powered interview tool. It employs various techniques to establish credibility, including professional design, fake testimonials, and comparisons with real companies. The attack culminates in a malware delivery through a clipboard hijacking technique, triggered when victims attempt to record a video introduction. This operation specifically targets high-value professionals in AI and cryptocurrency sectors, aiming to gain access to strategic information and financial assets.
AI Analysis
Technical Summary
The Contagious Interview campaign is a DPRK-linked cyber espionage and financial theft operation leveraging a fake job platform to target high-value AI and cryptocurrency professionals, primarily in the U.S. The platform, hosted at lenvny.com and related domains, is designed to appear as a legitimate AI-powered interview tool, complete with professional UI, fake testimonials, and references to well-known tech companies to establish credibility. Victims are lured into engaging with the platform under the guise of job interviews, where they are prompted to record video introductions. This user action triggers a clipboard hijacking malware delivery mechanism that captures sensitive data and executes malicious payloads. The malware employs techniques such as code obfuscation (T1027), persistence via registry run keys (T1547.001, T1547.009), masquerading (T1036), and command execution through scripting (T1059.001, T1059.005). The campaign also uses social engineering (T1566) and remote access tools (T1105) to maintain control and exfiltrate data. Although no CVE or known exploits are reported, the operation’s complexity and targeted nature indicate a well-resourced adversary aiming to steal intellectual property and cryptocurrency assets. Indicators of compromise include specific IP addresses (69.62.86.78, 72.61.9.45) and domains (advisorflux.com, assureeval.com, carrerlilla.com, lenvny.com). The campaign’s focus on AI and cryptocurrency sectors highlights the strategic intent to access cutting-edge technology and financial resources.
Potential Impact
For European organizations, especially those involved in AI research, development, and cryptocurrency, this threat poses a significant risk of intellectual property theft and financial loss. Compromise of AI talent could lead to exposure of proprietary algorithms, research data, and strategic plans, undermining competitive advantage and national technological leadership. Cryptocurrency professionals targeted could suffer direct financial theft or loss of wallet credentials. The social engineering approach increases the risk of insider threats and credential compromise, potentially enabling broader network infiltration. Given the global nature of AI and crypto sectors, European professionals may be targeted either directly or via collaboration with U.S. entities. The malware’s persistence and obfuscation techniques complicate detection and remediation, potentially leading to prolonged unauthorized access and data exfiltration. The medium severity rating reflects the targeted scope and complexity, but the potential impact on confidentiality and financial assets is substantial.
Mitigation Recommendations
European organizations should implement targeted awareness training focused on sophisticated social engineering tactics used in recruitment scams, emphasizing verification of job platforms and interview processes. Deploy endpoint detection and response (EDR) solutions capable of identifying clipboard hijacking and suspicious scripting activities. Monitor network traffic for connections to known malicious IPs and domains associated with this campaign (e.g., lenvny.com, advisorflux.com). Enforce strict application control policies to prevent execution of unauthorized scripts and binaries. Use multi-factor authentication (MFA) and credential monitoring to detect and block compromised accounts. Establish incident response playbooks specific to recruitment-related phishing and malware delivery. Collaborate with threat intelligence sharing groups to receive timely updates on indicators of compromise. Encourage verification of job offers through official company channels and limit sharing of sensitive information during recruitment. Regularly audit registry run keys and startup items for unauthorized persistence mechanisms. Finally, maintain robust backup and recovery procedures to mitigate impact of potential data loss.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Finland
Indicators of Compromise
- ip: 69.62.86.78
- ip: 72.61.9.45
- domain: advisorflux.com
- domain: assureeval.com
- domain: carrerlilla.com
- domain: lenvny.com
Inside DPRK's Fake Job Platform Targeting U.S. AI Talent
Description
This analysis details a sophisticated DPRK-linked operation called Contagious Interview, which uses a fake job platform to target U.S. AI talent. The campaign mimics legitimate recruitment processes, offering job listings from well-known tech companies to lure victims. The platform, hosted at lenvny[.]com, is designed to appear as a legitimate AI-powered interview tool. It employs various techniques to establish credibility, including professional design, fake testimonials, and comparisons with real companies. The attack culminates in a malware delivery through a clipboard hijacking technique, triggered when victims attempt to record a video introduction. This operation specifically targets high-value professionals in AI and cryptocurrency sectors, aiming to gain access to strategic information and financial assets.
AI-Powered Analysis
Technical Analysis
The Contagious Interview campaign is a DPRK-linked cyber espionage and financial theft operation leveraging a fake job platform to target high-value AI and cryptocurrency professionals, primarily in the U.S. The platform, hosted at lenvny.com and related domains, is designed to appear as a legitimate AI-powered interview tool, complete with professional UI, fake testimonials, and references to well-known tech companies to establish credibility. Victims are lured into engaging with the platform under the guise of job interviews, where they are prompted to record video introductions. This user action triggers a clipboard hijacking malware delivery mechanism that captures sensitive data and executes malicious payloads. The malware employs techniques such as code obfuscation (T1027), persistence via registry run keys (T1547.001, T1547.009), masquerading (T1036), and command execution through scripting (T1059.001, T1059.005). The campaign also uses social engineering (T1566) and remote access tools (T1105) to maintain control and exfiltrate data. Although no CVE or known exploits are reported, the operation’s complexity and targeted nature indicate a well-resourced adversary aiming to steal intellectual property and cryptocurrency assets. Indicators of compromise include specific IP addresses (69.62.86.78, 72.61.9.45) and domains (advisorflux.com, assureeval.com, carrerlilla.com, lenvny.com). The campaign’s focus on AI and cryptocurrency sectors highlights the strategic intent to access cutting-edge technology and financial resources.
Potential Impact
For European organizations, especially those involved in AI research, development, and cryptocurrency, this threat poses a significant risk of intellectual property theft and financial loss. Compromise of AI talent could lead to exposure of proprietary algorithms, research data, and strategic plans, undermining competitive advantage and national technological leadership. Cryptocurrency professionals targeted could suffer direct financial theft or loss of wallet credentials. The social engineering approach increases the risk of insider threats and credential compromise, potentially enabling broader network infiltration. Given the global nature of AI and crypto sectors, European professionals may be targeted either directly or via collaboration with U.S. entities. The malware’s persistence and obfuscation techniques complicate detection and remediation, potentially leading to prolonged unauthorized access and data exfiltration. The medium severity rating reflects the targeted scope and complexity, but the potential impact on confidentiality and financial assets is substantial.
Mitigation Recommendations
European organizations should implement targeted awareness training focused on sophisticated social engineering tactics used in recruitment scams, emphasizing verification of job platforms and interview processes. Deploy endpoint detection and response (EDR) solutions capable of identifying clipboard hijacking and suspicious scripting activities. Monitor network traffic for connections to known malicious IPs and domains associated with this campaign (e.g., lenvny.com, advisorflux.com). Enforce strict application control policies to prevent execution of unauthorized scripts and binaries. Use multi-factor authentication (MFA) and credential monitoring to detect and block compromised accounts. Establish incident response playbooks specific to recruitment-related phishing and malware delivery. Collaborate with threat intelligence sharing groups to receive timely updates on indicators of compromise. Encourage verification of job offers through official company channels and limit sharing of sensitive information during recruitment. Regularly audit registry run keys and startup items for unauthorized persistence mechanisms. Finally, maintain robust backup and recovery procedures to mitigate impact of potential data loss.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.validin.com/blog/inside_dprk_fake_job_platform/"]
- Adversary
- DPRK
- Pulse Id
- 6926d16a60c2447d2c490745
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip69.62.86.78 | — | |
ip72.61.9.45 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainadvisorflux.com | — | |
domainassureeval.com | — | |
domaincarrerlilla.com | — | |
domainlenvny.com | — |
Threat ID: 6926d42e63e47a62eb4f31d4
Added to database: 11/26/2025, 10:19:26 AM
Last enriched: 11/26/2025, 10:19:44 AM
Last updated: 1/19/2026, 7:04:44 AM
Views: 214
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-18
MediumThreatFox IOCs for 2026-01-17
MediumLOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing
MediumGootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
MediumThreatFox IOCs for 2026-01-16
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.