Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Malicious Ads Target Freelance Developers via GitHub
Malicious Ads Target Freelance Developers via GitHub
Security

Malicious Ads Target Freelance Developers via GitHub

February 19, 2026No Comments2 Mins Read

A new malware campaign targeting freelance developers has been using deceptive job advertisements to trick them into downloading malicious software disguised as legitimate tools.

The campaign primarily spreads through GitHub repositories and relies on freelancers’ eagerness to secure remote work opportunities.

The attackers pose as reputable companies, offering freelance developers attractive job opportunities. To make their deception convincing, they set up fake websites and distribute malicious software under the guise of professional development tools.

Once downloaded, the malware can compromise the victim’s system, allowing attackers to steal credentials or install additional payloads.

ESET researchers have linked the campaign to a threat actor they call “DeceptiveDevelopment.” The group specializes in targeting freelance platforms and coding communities to spread malware. Victims are often directed to GitHub, where malicious repositories host tools laden with hidden threats.

“DeceptiveDevelopment was first publicly described by Phylum and Unit 42 in 2023 and has already been partially documented under the names Contagious Interview and DEV#POPPER,” ESET wrote.

“We have conducted further analysis of this activity cluster and its operator’s initial access methods, network infrastructure, and toolset, including new versions of the two malware families used by DeceptiveDevelopment – InvisibleFerret and […] BeaverTail.”

The malware uses various techniques to evade detection and persist on compromised systems. ESET noted that it collects sensitive information, including saved login credentials, and can deliver additional malware payloads remotely.

Read more on how threat actors target jobseekers: Lazarus Group Targets Bitdefender Researcher with LinkedIn Recruiting Scam

Developers are advised to exercise caution when applying for freelance opportunities online. Verifying job offers and researching potential employers can help mitigate risks.

See also  Bridged Polkadot Exploiter Drains $269K via Tornado Cash

Experts also recommend avoiding downloads from unfamiliar GitHub repositories and keeping systems updated with robust security software.

“The DeceptiveDevelopment cluster is an addition to an already large collection of money-making schemes employed by North Korea-aligned actors and conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies,” ESET explained.

“We observed it go from primitive tools and techniques to more advanced and capable malware, as well as more polished techniques to lure in victims and deploy the malware. Any online job-hunting and freelancing platform can be at risk of being abused for malware distribution by fake recruiters.”

As freelance work continues to grow, threat actors are likely to exploit this evolving ecosystem. Developers and companies alike must implement stronger protections to defend against such targeted threats.

Source link

Ads Developers Freelance GitHub Malicious Target

Related Posts

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026
Top Posts

Horizon Technology Finance: 10% Tech And Life Science Yield, Monthly Payer

October 4, 2023

CEO of Binance hacked by exploit of mobile provider, which probably leaves your own crypto visible

February 1, 2026

OKX is building a social network directly into its trading app after massive $25 billion valuation

March 6, 2026

Type above and press Enter to search. Press Esc to cancel.