North Korean Hackers Target Crypto Devs With New AkdoorTea Malware

The420 Correspondent
2 Min Read

A Familiar Trap with a New Payload

The attacks begin with fake job offers. Developers—often those working on crypto or blockchain projects—are contacted via LinkedIn or freelance platforms and lured into what appears to be a coding assessment or technical interview. Victims are asked to run scripts or download GitHub repositories that secretly deploy malware.

The campaign, tracked by ESET under the name DeceptiveDevelopment, affects Windows, macOS, and Linux environments, showcasing a growing technical reach and persistent focus on high-value developer targets.

AkdoorTea and the Modular Malware Chain

What sets this wave apart is the use of AkdoorTea, a new backdoor likely linked to earlier North Korean tools like NukeSped. Delivered through a ZIP file disguised as “nvidiaRelease.zip,” the malware is activated via Visual Basic scripts and works alongside older tools such as BeaverTail, WeaselStore, and Tropidoor.

Each component plays a role—maintaining access, stealing data, or dropping cryptocurrency miners. AkdoorTea appears to focus on persistence and remote control, giving attackers deeper visibility into infected machines.

FutureCrime Summit 2026: Registrations to Open Soon for India’s Biggest Cybercrime Conference

A Blurred Line Between Cybercrime and Espionage

While the campaign mimics cybercriminal tactics, its objectives point to state interests. Stolen data can be used to impersonate developers, infiltrate firms, or harvest crypto assets. One case involved a job applicant under the alias “Kyle Lankford,” whose digital footprint matched profiles tied to North Korean operatives.

ESET and other firms say this campaign may be part of a broader effort by Pyongyang to place operatives inside tech companies using fraudulent identities and stolen credentials.

A Persistent, Evolving Threat

The AkdoorTea campaign highlights a strategic shift: instead of building highly novel tools, attackers are recycling components and automating delivery. The result is a stealthy, scalable operation that can adapt quickly.

As the boundaries between espionage, cybercrime, and financial theft continue to blur, organizations in the crypto and software space remain prime targets—caught between innovation and exploitation.

Stay Connected