
{"id":60730,"date":"2025-04-21T06:25:45","date_gmt":"2025-04-21T06:25:45","guid":{"rendered":"https:\/\/mycryptomania.com\/?p=60730"},"modified":"2025-04-21T06:25:45","modified_gmt":"2025-04-21T06:25:45","slug":"unmasking-suspicious-github-activity-the-wagemole-campaign-and-its-links-to-dprk-threat-actors","status":"publish","type":"post","link":"https:\/\/mycryptomania.com\/?p=60730","title":{"rendered":"Unmasking Suspicious GitHub Activity: The Wagemole Campaign and Its Links to DPRK Threat Actors"},"content":{"rendered":"<p>image: <a href=\"https:\/\/x.com\/cyberwarcon\">https:\/\/x.com\/cyberwarcon<\/a><\/p>\n<h3>Table of\u00a0Contents<\/h3>\n<p><strong>Executive Summary<\/strong><\/p>\n<p><strong>Contagious Interview and Wagemole Campaigns<\/strong><\/p>\n<p><strong>\u201cWageMole\u201d Campaign on\u00a0GitHub<\/strong><\/p>\n<p><strong>Suspicious Activity and Behavior in\u00a0GitHub<\/strong><\/p>\n<p><strong>Case: Interaction with Organizations<\/strong><\/p>\n<p><strong>Part 1: \u201cPlease Invite Me to the GitHub Community Organization\u201d<\/strong><\/p>\n<p><strong>Part 2: Interaction of Accounts with GitHub Repositories<\/strong><\/p>\n<p><strong>Part 3: Cluster of Older GitHub\u00a0Accounts<\/strong><\/p>\n<p><strong>Part 4: Suspicious Interactions of These Accounts Across Different Repositories (Seeking-Job Behavior)<\/strong><\/p>\n<p><strong>Part 5: Suspicious Accounts with High Incidence and Activity Related to \u201cWagemole\u201d Campaign<\/strong><\/p>\n<p><strong>Case 1: Suspicious Accounts Interacting with Developer<\/strong><strong>Case 2: Suspicious Account Participating in a\u00a0DAO<\/strong><strong>Case 3: Threat Actors Disguised as Developers Building\u00a0TaraSwap<\/strong><strong>Case 4: GitHub Accounts interacting with the Stellar Foundation repositories<\/strong><\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>IOCs<\/p>\n<p><strong>Additional Resources<\/strong><\/p>\n<h3>Executive Summary<\/h3>\n<p>This research seeks to shed light on the rising suspicious activity on GitHub linked to the \u201cWagemole campaign,\u201d associated with North Korean IT worker operations. It uncovers emerging behavior patterns, engagement strategies, instances of coordinated activity, and the formation of new clusters of fresh empty accounts in GitHub. Additionally, it explores interactions with Web3 projects, suspicious interview practices, and cases where these accounts have successfully operated under the\u00a0radar.<\/p>\n<p>Our recent investigations have revealed that these accounts not only display specific patterns in their followers and the accounts they follow but also share notable similarities in key aspects such as creation dates, declared skills, similar profile images, comparable bios, and analogous GitHub handles, among other\u00a0traits.<\/p>\n<p>Our previous investigations uncovered much of the activity associated with the \u201cWagemole\u201d campaigns, specifically on\u00a0GitHub:<\/p>\n<p><a href=\"https:\/\/medium.com\/coinmonks\/recap-of-findings-regarding-suspicious-lazarus-activity-on-github-cc361074bdc2\">Summary of Findings on Suspicious Lazarus Group Activity on\u00a0GitHub<\/a><a href=\"https:\/\/medium.com\/coinmonks\/reviewing-the-activity-of-github-accounts-associated-with-lazarus-635cb47881dc\">Reviewing the activity of GitHub accounts associated with\u00a0Lazarus<\/a><a href=\"https:\/\/medium.com\/coinmonks\/fake-recruiters-in-github-68d0d3bf297d\">Fraud Alert: Fake recruiters on GitHub and\u00a0LinkedIn<\/a><\/p>\n<p>In our previous work, we focused on identifying the characteristics of these accounts through behavioral analysis, image analysis, follower and following patterns, repository similarities, and other factors that highlight shared traits among certain accounts. This investigation will build on that foundation by analyzing the activity of many of the accounts we identified in earlier research.<\/p>\n<h4>Contagious Interview and WageMole campaigns<\/h4>\n<p>By late 2023, Palo Alto had outlined the distinctions between these two campaigns. The first, known as <a href=\"https:\/\/unit42.paloaltonetworks.com\/two-campaigns-by-north-korea-bad-actors-target-job-hunters\/\">\u201cContagious Interview,\u201d involves threat actors posing as employers\u200a\u2014\u200aoften anonymously or with vague identities\u200a\u2014\u200ato trick software developers into installing malware during the interview process, enabling various forms of theft. This campaign is attributed with moderate confidence to a North Korean state-sponsored threat\u00a0actor.<\/a><\/p>\n<p>The second campaign, known as \u201cWagemole,\u201d <a href=\"https:\/\/unit42.paloaltonetworks.com\/fake-north-korean-it-worker-activity-cluster\/\">involves North Korean IT workers masquerading as job seekers to secure unauthorized employment with organizations in the United States and other countries, likely for financial gain or espionage purposes<\/a>.<\/p>\n<p>In late 2024, <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/pyongyang-your-payroll-rise-north-korean-remote-workers-west#how-to-protect-against-wagemole\">Zscaler ThreatLabz reported that North Korean IT workers were using the WageMole campaign to secure remote jobs in other countries<\/a>. This campaign, closely linked to the Contagious Interview operation, relies on a combination of social engineering and technical skills to obtain legitimate remote job opportunities and generate income through development work<\/p>\n<h4>\u201cWageMole\u201d campaign on\u00a0GitHub<\/h4>\n<p>In our previous investigations focused on GitHub, we observed the same shift in suspicious activities described by Zscaler ThreatLabz and Palo Alto, ranging from fake recruiters (<a href=\"https:\/\/unit42.paloaltonetworks.com\/two-campaigns-by-north-korea-bad-actors-target-job-hunters\/\">Contagious Interview<\/a>) to job seekers (<a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/pyongyang-your-payroll-rise-north-korean-remote-workers-west#how-to-protect-against-wagemole\">WageMole campaing<\/a>).<\/p>\n<p><a href=\"https:\/\/unit42.paloaltonetworks.com\/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters\/\">Some of our findings regarding a LinkedIn profile, later cited by Palo Alto, suggest that the profile we identified was later analyzed by their team, which reported it was associated with the Democratic People\u2019s Republic of Korea (DPRK), and leveraging social engineering as a fake recruiter to deploy new variants of BeaverTail and InvisibleFerret malware<\/a>. <a href=\"https:\/\/medium.com\/coinmonks\/suspicious-activity-in-github-associated-with-lazarus-group-200868dff910\"><strong>By tracing this same profile on GitHub, we uncovered a large cluster of fake developer accounts linked to the previously described WageMole campaign<\/strong><\/a><strong>.<\/strong><\/p>\n<p>Similarly, many of our findings on GitHub align with recent descriptions by Zscaler ThreatLabz regarding the activity of the threat actor in the WageMole campaign. Specifically, <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/pyongyang-your-payroll-rise-north-korean-remote-workers-west#how-to-protect-against-wagemole\">\u201cDuring the job search, WageMole threat actors aggressively utilize job-seeking platforms such as Indeed, Glassdoor, Upwork, and cryptocurrency-focused sites like degencryptojobs.com and web3.career. Throughout the job-hunting process, they target remote roles such as front-end\/back-end web developer, UX\/UI designer, full-stack engineer, and blockchain developer.\u201d<\/a><\/p>\n<p>Additionally, considering that our focus has been on suspicious activity within GitHub, <a href=\"https:\/\/medium.com\/coinmonks\/recap-of-findings-regarding-suspicious-lazarus-activity-on-github-cc361074bdc2\">previous investigations have revealed distinct patterns and characteristics in GitHub accounts. For instance, many of the accounts identified in this investigation share specific traits: similar profile images, statuses like \u201cworking from home,\u201d GitHub handles with recurring themes (e.g., Super, Dev, Happy, Smart, Top, Funny, King, Golden), closely aligned account creation dates, and mutual following patterns. These similarities suggest the presence of an interconnected network<\/a><\/p>\n<p>These previous investigations aimed to identify and analyze the presence and behavior of the threat actor on GitHub related to the <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/pyongyang-your-payroll-rise-north-korean-remote-workers-west#how-to-protect-against-wagemole\">WageMole<\/a> campaign. Based on these previous findings, the focus of this investigation is to examine the activities of these suspicious accounts on GitHub through specific examples and case\u00a0studies<\/p>\n<h3><strong>Suspicious activity and behavior in\u00a0Github:<\/strong><\/h3>\n<p><a href=\"https:\/\/www.ic3.gov\/PSA\/2024\/PSA240903\">Over the past year, there has been a noticeable increase in suspicious activity across various social media<\/a> platforms and sites like GitHub. This phenomenon has revealed a complex network of fake accounts designed to appear as \u201cdevelopers.\u201d A significant portion of these accounts targets content and audiences within the Web3\u00a0sector.<\/p>\n<p>Recently, it has been identified that these fake accounts on GitHub attempt to gain trust by collaborating on projects, often highlighting the title of \u201copen source contributor\u201d in their descriptions or bios. This, along with other behaviors, reflects strategies of adaptation and stealth, enabling them to integrate more subtly (through commits) and remain unnoticed. By establishing a history of collaboration on GitHub, they seek to strengthen their presence and, in some cases, even attempt to secure employment, all while posing potential future risks to the projects they infiltrate.<\/p>\n<h3>Case: Interaction with organizations<\/h3>\n<p>There are distinct behavior patterns among these \u201cfake dev\u201d accounts in how they engage and interact with organizations on GitHub. A behavior previously outlined in the research tittle: \u201c<a href=\"https:\/\/medium.com\/coinmonks\/reviewing-the-activity-of-github-accounts-associated-with-lazarus-635cb47881dc\">Reviewing the activity of GitHub accounts associated with Lazarus<\/a>\u201d reveals that many of these accounts, which also follow each other, have joined these organizations.<\/p>\n<p>This behavior, aimed at generating \u201ccredibility\u201d for these GitHub accounts by joining organizations, has been observed on a broader scale. Additionally, there are patterns such as newly created accounts, with profiles specifically seeking to join these particular organizations.<\/p>\n<p>Below, we will present some examples of how these accounts join these organizations.<\/p>\n<p>While there are legitimate accounts within these organizations, there is a set of accounts associated with a network of fake developers who exploit these associations to boost their profiles. The organizations mentioned in the previous image\u00a0are:<\/p>\n<p>Organizations referenced:<br \/>https:\/\/github.com\/dev-protocol<br \/>https:\/\/github.com\/Design-and-Code<br \/>https:\/\/github.com\/Huniko-Team<br \/>https:\/\/github.com\/Magic-Academy<br \/>https:\/\/github.com\/App-Choreography<br \/>https:\/\/github.com\/Devs-Dungeon<br \/>https:\/\/github.com\/infraform<br \/>https:\/\/github.com\/AccessibleForAll<br \/>https:\/\/github.com\/CommunityPro<br \/>https:\/\/github.com\/Bauddhik-Geeks<br \/>https:\/\/github.com\/Your-brainstorming<br \/>https:\/\/github.com\/EddieHubCommunity<br \/>https:\/\/github.com\/Py-Contributors<br \/>https:\/\/github.com\/chesslablab<\/p>\n<p>While many accounts on GitHub engage in this type of activity, some are legitimate, while others are linked to the \u201cfake developers\u201d network.<\/p>\n<p>This particular behavior of systematically joining organizations after creating a GitHub account is a notable pattern that has recently been observed in many accounts conducting social engineering on GitHub. Their goal is to cultivate a \u201ctrustworthy\u201d image, allowing them to blend into the community more seamlessly.<\/p>\n<h3>Part 1: \u201cPlease invite me to the GitHub Community Organization\u201d<\/h3>\n<p>As mentioned earlier, it is important to note that these \u201corganizations\u201d also include legitimate GitHub accounts, particularly from India and Pakistan, who use these connections to enhance their personal profiles.<\/p>\n<p>However, it is evident that accounts linked to this network of fake developers have also adopted this method to increase their credibility on GitHub. Below, we examine the accounts attempting to join this organization<a href=\"https:\/\/github.com\/CommunityPro\/support\/issues?page=1&amp;q=is%3Aissue+is%3Aclosed\"> [CommunityPro]<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/CommunityPro\/support\/issues?page=1&amp;q=is%3Aissue+is%3Aclosed\">https:\/\/github.com\/CommunityPro\/support\/issues?page=1&amp;q=is%3Aissue+is%3Aclosed<\/a><\/p>\n<p>On one hand, there is a significant number of legitimate accounts that use this method, sometimes excessively, by joining over 20 organizations; these cases are typically associated with real individuals. On the other hand, there is a group of accounts attempting to mimic these behaviors in order to gain greater credibility.<\/p>\n<p>Some examples of suspicious accounts are as\u00a0follows:<\/p>\n<h4>Example 1:<\/h4>\n<p>In this case, we have an account with a person claiming 8 years of experience but with only 1 month of activity. <a href=\"https:\/\/www.motokimasuo.com\/\">The account features a website registered on January 4, 2025<\/a>, with all links broken, an AI-generated profile image, and recently, we\u2019ve noticed some \u201cdevelopers\u201d listing Japan as their location.<\/p>\n<p><a href=\"https:\/\/github.com\/motokimasuo\">https:\/\/github.com\/motokimasuo<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/search\/results\/all\/headless?keywords=Motoki%20Masuo&amp;origin=GLOBAL_SEARCH_HEADER&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BLFicRqkyS5Gb9Be%2BHnT%2BZQ%3D%3D\"><em>LinkedIn account<\/em><\/a><\/p>\n<p>After checking some repositories from this account, we came to look the people who like the repository named <a href=\"https:\/\/github.com\/motokimasuo\/motokimasuo\">motokimasuo<\/a>:<\/p>\n<p>In this list of accounts we are going to check the activity of: ShinySyntax<\/p>\n<p><a href=\"https:\/\/github.com\/ShinySyntax\">https:\/\/github.com\/ShinySyntax<\/a><\/p>\n<p>This profile, in particular, shows inconsistencies by using different identities, which are further highlighted by broken\u00a0links.<\/p>\n<p><a href=\"https:\/\/github.com\/ShinySyntax\">https:\/\/github.com\/ShinySyntax<\/a><\/p>\n<p>It\u2019s interesting because the interaction and eagerness to get hired seem overly conspicuous, as seen\u00a0here:<\/p>\n<p><a href=\"https:\/\/github.com\/search?q=ShinySyntax&amp;type=issues\">https:\/\/github.com\/search?q=ShinySyntax&amp;type=issues<\/a><\/p>\n<p>On the other hand, there are inconsistencies in the profile that suggest the use of multiple identities to secure a job. This appears to be the website associated with the individual, using the name Muhammad Abdul Sammad, despite their Asian\u00a0features<\/p>\n<p><a href=\"https:\/\/shiny-dev.com\/\">https:\/\/shiny-dev.com\/<\/a><\/p>\n<p>Similarly, within their personal information, there is a link to a Telegram\u00a0account:<\/p>\n<p><a href=\"https:\/\/github.com\/ShinySyntax\/ShinySyntax012\">https:\/\/github.com\/ShinySyntax\/ShinySyntax012<\/a><\/p>\n<p>This Telegram handle using this profile: sasuke310\u200a\u2014\u200a<a href=\"https:\/\/t.me\/sasuke310\">https:\/\/t.me\/sasuke310<\/a><\/p>\n<p><a href=\"https:\/\/t.me\/sasuke310\">https:\/\/t.me\/sasuke310<\/a><\/p>\n<p>This Telegram directs to a profile called James\u00a0Kano<\/p>\n<p><a href=\"https:\/\/www.sasuke.dev\/\">https:\/\/www.sasuke.dev\/<\/a><\/p>\n<p>The accounts associated with this website are also linked to another account on\u00a0GitHub:<\/p>\n<p><a href=\"https:\/\/github.com\/spmoe\">https:\/\/github.com\/spmoe<\/a><\/p>\n<p>They also use another website in addition to <strong>sasuke.dev.<\/strong> The name of this website is spomoe.xyz, and it was created on April 15,\u00a02024.<\/p>\n<p><a href=\"https:\/\/www.spmoe.xyz\/\">https:\/\/www.spmoe.xyz\/<\/a><\/p>\n<p>The Telegram account use both names: spmoed and\u00a0sasuke:<\/p>\n<p><a href=\"https:\/\/t.me\/spmoed\">https:\/\/t.me\/spmoed<\/a><\/p>\n<h4>Example 2:<\/h4>\n<p>Another example that highlights the existence of a network of GitHub accounts joining specific organizations and making commits across various projects to build credibility is as\u00a0follows:<\/p>\n<p>In this case, we will analyze the profile: <a href=\"https:\/\/github.com\/kallis312\">https:\/\/github.com\/kallis312<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/motokimasuo\/motokimasuo\/stargazers\">https:\/\/github.com\/motokimasuo\/motokimasuo\/stargazers<\/a><\/p>\n<p>Similarly, they join organizations similar to those mentioned earlier:<\/p>\n<p><a href=\"https:\/\/github.com\/kallis312\">https:\/\/github.com\/kallis312<\/a><\/p>\n<p>In the following post, we can see that they engage in the same type of interaction with these organizations, and continue to do\u00a0so:<\/p>\n<p><a href=\"https:\/\/github.com\/EddieHubCommunity\/support\/issues\/8881\">https:\/\/github.com\/EddieHubCommunity\/support\/issues\/8881<\/a><\/p>\n<p>Upon searching for \u201cyamataku0518\u201d on GitHub, we found several accounts that have interacted with this GitHub\u00a0handle:<\/p>\n<p><a href=\"https:\/\/github.com\/search?q=yamataku0518&amp;type=repositories\">https:\/\/github.com\/search?q=yamataku0518&amp;type=repositories<\/a><\/p>\n<p>Similarly, there is a forked version on another profile, suggesting that the GitHub handle may have\u00a0changed<\/p>\n<p>This account also shares commits with other accounts we have previously monitored, which exhibit certain characteristics (such as profile images, GitHub handles) and behaviors (like follower patterns).<\/p>\n<p>Another case linked to the <a href=\"https:\/\/github.com\/kallis312\">\u201ckallis312\u201d<\/a> profile involves the following, where this account shared contributions in April 2024 with the following account:<\/p>\n<p><a href=\"https:\/\/github.com\/kallis312?tab=overview&amp;from=2024-01-01&amp;to=2024-01-31\">https:\/\/github.com\/kallis312?tab=overview&amp;from=2024-01-01&amp;to=2024-01-31<\/a><\/p>\n<p>The account mentioned is:\u00a0xtoben22<\/p>\n<p><a href=\"https:\/\/github.com\/xtoben22\">https:\/\/github.com\/xtoben22<\/a><\/p>\n<p>Previously, this account used the GitHub handle \u201cUniversal9622,\u201d and the email associated with the account is williamduncan91413@gmail.com<\/p>\n<p><a href=\"https:\/\/github.com\/xtoben22\/evm-trace\/commit\/58c39ad8653e1a3b12a66f75c659f6f291c2a038.patch\">https:\/\/github.com\/xtoben22\/evm-trace\/commit\/58c39ad8653e1a3b12a66f75c659f6f291c2a038.patch<\/a><\/p>\n<p>By searching for the GitHub handle \u201cUniversal9622,\u201d we found the same handle listed on a job platform for individuals in China, which is also shared on Telegram.<\/p>\n<p><a href=\"https:\/\/discovertelegram.com\/channel\/abetterweb3_cn\">https:\/\/discovertelegram.com\/channel\/abetterweb3_cn<\/a><\/p>\n<p>In this channel, there is a user using the same name, William Duncan, and writing in\u00a0Chinese:<\/p>\n<p><a href=\"https:\/\/t.me\/s\/abetterweb3_cn?q=universal9622\">https:\/\/t.me\/s\/abetterweb3_cn?q=universal9622<\/a><\/p>\n<p>Considering the scattered information, the change in the GitHub handle, and the suspicion that this may be an Asian individual using a very Latino name, this case also serves as an example of inconsistency and incoherent information in GitHub accounts attempting to collaborate on projects.<\/p>\n<h4>Example 3:<\/h4>\n<p>Similar examples of an account using this \u201cinteraction\u201d to boost his profile is the user <strong>BitFancy:<\/strong><\/p>\n<p><a href=\"https:\/\/github.com\/CommunityPro\/support\/issues\/742\">https:\/\/github.com\/CommunityPro\/support\/issues\/742<\/a><\/p>\n<p>Likewise, his profile have 1 year of activity and some irregular activity in some repositories, broken links and <em>LinkedIn profile with no activity.<\/em><\/p>\n<p><a href=\"https:\/\/github.com\/BitFancy\">https:\/\/github.com\/BitFancy<\/a><\/p>\n<p>After reviewing several repositories from the user \u201c<a href=\"https:\/\/github.com\/BitFancy\">bitfancy<\/a>,\u201d one repository stood out to us: \u201cfancydeveloper.\u201d This repository caught our attention because it utilized the user\u2019s stats. However, it appears the GitHub account associated with it has since changed its\u00a0handle:<\/p>\n<p><a href=\"https:\/\/github.com\/BitFancy\/fancydeveloper\/blob\/main\/README.md\">https:\/\/github.com\/BitFancy\/fancydeveloper\/blob\/main\/README.md<\/a><\/p>\n<p>The stats in this profile was linked to the GitHub account: \u201ccharles0830\u201d<\/p>\n<p>The account that was using this GitHub handle\u00a0was:<\/p>\n<p><a href=\"https:\/\/github.com\/Phoenix-Genius\">https:\/\/github.com\/Phoenix-Genius<\/a><\/p>\n<p>This type of account, with its personal description, use of images similar to those identified in previous investigations, a high number of followers and followings, and unusual methods of trying to be \u201chired,\u201d stands\u00a0out.<\/p>\n<p>In the following interaction, it is evident that their previous GitHub handle was \u201ccharles0830,\u201d and they were subsequently rejected:<\/p>\n<p>Another quite unusual interaction is the following, where they claim to be a \u201csenior full-stack developer\u201d and state that they\u2019ve been using GitHub for 13\u00a0years:<\/p>\n<p><a href=\"https:\/\/github.com\/openAOD\/Join\/issues\/131\">https:\/\/github.com\/openAOD\/Join\/issues\/131<\/a><\/p>\n<p>Similarly, another incident linked to the GitHub handle \u201ccharles0830\u201d highlights evidence of coordination and organization:<\/p>\n<p><a href=\"https:\/\/github.com\/blackbill2024\">https:\/\/github.com\/blackbill2024<\/a><\/p>\n<p>This other account uses the same stats as the account that previously used the GitHub handle \u201ccharles0830.\u201d Therefore, there is a high likelihood that the activity of these accounts is linked to this network of fake developers on GitHub, which is commonly associated with the activities of DPRK IT\u00a0workers.<\/p>\n<p>In this case, the account stopped using the GitHub handle \u201ccharles0830\u201d and has now adopted the following under a new identity: \u201c<a href=\"https:\/\/github.com\/Phoenix-Genius\">Phoenix-Genius<\/a>\u201d<\/p>\n<p><a href=\"https:\/\/github.com\/Phoenix-Genius\">https:\/\/github.com\/Phoenix-Genius<\/a><\/p>\n<p>We can also observe that they claim to be a \u201cSenior Software Developer\u201d and use specific images that we\u2019ve identified in numerous accounts attempting to gain credibility or secure employment by \u201ccollaborating\u201d on GitHub projects.<\/p>\n<h4>Example 4<\/h4>\n<p>In this example, it occurs the same as the account wants to join certain organizations. However the information they introduce seems\u00a0fake<\/p>\n<p><a href=\"https:\/\/github.com\/Design-and-Code\/support\/issues?q=is%3Aissue+author%3Avuedev2113\">https:\/\/github.com\/Design-and-Code\/support\/issues?q=is%3Aissue+author%3Avuedev2113<\/a><\/p>\n<p>In this case it is a new account and the person is stablished in\u00a0Ukraine:<\/p>\n<p><a href=\"https:\/\/github.com\/vuedev2113\">https:\/\/github.com\/vuedev2113<\/a><\/p>\n<p>Upon reviewing the website mentioned on GitHub: <a href=\"https:\/\/portfolio-vue-1b44e.web.app\/\">https:\/\/portfolio-vue-1b44e.web.app\/<\/a><\/p>\n<p><a href=\"https:\/\/portfolio-vue-1b44e.web.app\/\">https:\/\/portfolio-vue-1b44e.web.app\/<\/a><\/p>\n<p>All the links are broken, and the information on this website appears to be\u00a0false.<\/p>\n<p>Additionally, conducting some Google searches yields specific results, revealing suspicious links and additional information that doesn\u2019t align with the details\u00a0provided<\/p>\n<p><a href=\"https:\/\/www.google.com\/search?q=Oleh+Zamryha&amp;sca_esv=567ab18d067741e3&amp;rlz=1C1GCEU_esCO1047CO1047&amp;sxsrf=ADLYWIJskPbYLfvOU0BmPGKbCgwAZ9Romw:1737154581952&amp;ei=FeCKZ7bpOYWvwbkPuIuA6As&amp;start=0&amp;sa=N&amp;sstk=ATObxK5RXFuoS2HjKSLgca4LSZedz6ej2Wm8Y_VvstNPUm4U7ZcsuoKESRGPcXxKkX6JYAwtpMKTKkMGclOihelPSsUCL-AQ-EzUWICxxjrqlZga_rcIoz26Z5B6BXJkwwUZ&amp;ved=2ahUKEwj2x5uO7f2KAxWFVzABHbgFAL04ChDy0wN6BAgKEAQ&amp;biw=1536&amp;bih=756&amp;dpr=1.25\">Google search<\/a><\/p>\n<h4><strong>Example 5:<\/strong><\/h4>\n<p>Some of the mentioned profiles follow each other, forming a network of accounts that share common traits, such as being labeled \u201cBlockchain,\u201d \u201cFull Stack,\u201d etc. These accounts also contain multiple identities within their repositories, along with evidence of false data. Additionally, some of these accounts follow an organization called \u201c<a href=\"https:\/\/github.com\/orgs\/stabilitydao\/people\">stability DAO<\/a>\u201d.<\/p>\n<p>Some of the mentioned profiles follow each other, forming a network of accounts that share common labels like \u201cBlockchain,\u201d \u201cFull Stack,\u201d etc. These accounts also feature multiple identities within their repositories, as well as evidence of false\u00a0data.<\/p>\n<p>Additionally, there are other noteworthy accounts we\u2019ve previously mentioned, such as the account \u201cOnlyForward0613\u201d<\/p>\n<p>The profile account is \u201cOnlyForward613\u201d\u00a0, its called\u201cDavee\u201d and according to his Bio is a \u201cSenior software Engineering\u201d.<\/p>\n<p><a href=\"https:\/\/github.com\/OnlyForward0613\">https:\/\/github.com\/OnlyForward0613<\/a><\/p>\n<p>Another recurring pattern is the intent to join specific groups we\u2019ve previously mentioned:<\/p>\n<p><a href=\"https:\/\/github.com\/search?q=OnlyForward0613&amp;type=issues\">https:\/\/github.com\/search?q=OnlyForward0613&amp;type=issues<\/a><\/p>\n<p>This GitHub account uses two different Twitter accounts, both with similar identities<\/p>\n<p><a href=\"https:\/\/x.com\/daveescott59\">https:\/\/x.com\/daveescott59<\/a>\u200a\u2014\u200a<a href=\"https:\/\/x.com\/DaveeScott22\">https:\/\/x.com\/DaveeScott22<\/a><\/p>\n<p>Through the Twitter account, they share their website and portfolio:<\/p>\n<p><a href=\"https:\/\/portfolio-29-6.vercel.app\/\">https:\/\/portfolio-29-6.vercel.app\/<\/a><\/p>\n<p>Additionally, their LinkedIn profile does not exist; however, they share a Facebook profile, where, like the other images, the photos appear to be manipulated:<\/p>\n<p><a href=\"https:\/\/www.facebook.com\/profile.php?id=61561446326312&amp;mibextid=ZbWKwL\">https:\/\/www.facebook.com\/profile.php?id=61561446326312&amp;mibextid=ZbWKwL<\/a><\/p>\n<p>A notable aspect is that three different accounts, with close connections in terms of mutual follows, use the same stats as OnlyForward0613 on their profiles. Coincidentally, these accounts align with our descriptions and are labeled as \u201cblockchain developers.\u201d One example is the account with the GitHub handle \u201cdevstar829\u201d:<\/p>\n<p><a href=\"https:\/\/github.com\/devstar829\/devstar829\">https:\/\/github.com\/devstar829\/devstar829<\/a><\/p>\n<p>Similar to this profile, there is also the account: unitop010<\/p>\n<p><a href=\"https:\/\/github.com\/unitop010\/unitop010\">https:\/\/github.com\/unitop010\/unitop010<\/a><\/p>\n<p>Lastly, this profile also uses the same stats: solidityDev05<\/p>\n<p><a href=\"https:\/\/github.com\/solidityDev05\/realcarpark\">https:\/\/github.com\/solidityDev05\/realcarpark<\/a><\/p>\n<p>This type of inconsistent activity, interconnected between these accounts, demonstrates clear coordination and patterns in how they interact with organizations on\u00a0GitHub.<\/p>\n<p>Evidence shows that there is interaction between these accounts, along with patterns of engagement with organizations. Moreover, these accounts often employ fake identities and use information from other accounts in their own profiles.<\/p>\n<p>These accounts, with their anomalous behavior and the way they engage with organizations, exhibit collective and organized conduct with clear objectives\u200a\u2014\u200aspecifically, to secure job opportunities or collaborate on projects, thereby boosting their credibility on\u00a0GitHub.<\/p>\n<p>Based on the information provided earlier, several suspicious accounts have been observed commenting on the repositories of these organizations. Notably, there is a high volume of accounts interacting with these repositories, with a considerable portion of them appearing to be legitimate as\u00a0well:<\/p>\n<p>GitHub accounts suspicious &#8211; organizations<\/p>\n<p>&#8211; https:\/\/github.com\/CommunityPro\/support\/issues?page=1&amp;q=is%3Aissue+is%3Aclosed<br \/>&#8211; https:\/\/github.com\/Py-Contributors\/support\/issues?page=1&amp;q=is%3Aissue+is%3Aclosed<br \/>&#8211; https:\/\/github.com\/EddieHubCommunity\/support\/issues?page=1&amp;q=is%3Aissue+is%3Aclosed<br \/>&#8211; https:\/\/github.com\/Design-and-Code\/support\/issues?q=is%3Aissue+is%3Aclosed<\/p>\n<p>An example of suspicious GitHub accounts interacting with these organizations is as\u00a0follows:<\/p>\n<p>Data set of Accounts<\/p>\n<p>https:\/\/github.com\/asseph<br \/>https:\/\/github.com\/thuongtruong1009<br \/>https:\/\/github.com\/Benjamin-cup<br \/>https:\/\/github.com\/Cardoso-topdev<br \/>https:\/\/github.com\/camillakathy<br \/>https:\/\/github.com\/erikerik116<br \/>https:\/\/github.com\/Kavorix<br \/>https:\/\/github.com\/Phoenix-Genius<br \/>https:\/\/github.com\/phoenix19950512<br \/>https:\/\/github.com\/smilephoenix103<br \/>https:\/\/github.com\/toptalhook<br \/>https:\/\/github.com\/uniwaydev<br \/>https:\/\/github.com\/creative2113<br \/>https:\/\/github.com\/SacredDever<br \/>https:\/\/github.com\/SacredDevKing<br \/>https:\/\/github.com\/GoldenDev176743<br \/>https:\/\/github.com\/dragonsea0927<br \/>https:\/\/github.com\/felipedev418<br \/>https:\/\/github.com\/techietrend<br \/>https:\/\/github.com\/popstar7<br \/>https:\/\/github.com\/Oyase-shinob<br \/>https:\/\/github.com\/dev0614<\/p>\n<p>&#8211; Bigger data set is private -Many of these accounts exhibit the same type of association, interacting similarly with organizations. Their accounts share specific patterns, such as similar bios and GitHub handles. Additionally, there are traces of these accounts using different identities. These and other characteristic aspects, such as their patterns of interaction and connections with these same accounts, provide evidence of an organized effort and objectives from this network of fake profiles on\u00a0GitHub.<\/p>\n<h3>Part 2: Interaction of Accounts with GitHub Repositories<\/h3>\n<p>These suspicious GitHub accounts also exhibit collective activity across other organizations and communities by making commits in these repositories.<\/p>\n<p>Many of these accounts performing these commits had been previously identified. The commits made by these accounts appear to overwrite or remove the contributions made by other accounts:<\/p>\n<p><a href=\"https:\/\/github.com\/typescript-cheatsheets\/react\/issues\/57\">https:\/\/github.com\/typescript-cheatsheets\/react\/issues\/57<\/a><\/p>\n<p>Many of these accounts had already been reported in this and previous investigations. It\u2019s important to highlight the accounts in this image that use these specific\u00a0images:<\/p>\n<p><a href=\"https:\/\/github.com\/fairskyDev0201\">https:\/\/github.com\/fairskyDev0201<\/a><\/p>\n<p>Previous investigations have already highlighted the association between accounts that tend to use similar GitHub handles and profile images, often linked to users identifying as \u201cfull stack developers\u201d seeking freelance opportunities.<\/p>\n<p>A similar example can be seen in the following repository, where a group of accounts with matching characteristics make these\u00a0commits.<\/p>\n<p><a href=\"https:\/\/github.com\/mckaywrigley\/chatbot-ui\/issues\/224\">https:\/\/github.com\/mckaywrigley\/chatbot-ui\/issues\/224<\/a><\/p>\n<p>In the previous example, we can highlight a profile similar to the one we presented, where an account already referenced uses the same type of\u00a0image:<\/p>\n<p><a href=\"https:\/\/github.com\/OceanDev89\">https:\/\/github.com\/OceanDev89<\/a><\/p>\n<p>In this case, the profile uses the GitHub handle <a href=\"https:\/\/github.com\/OceanDev89\">\u201cOceanDev89,\u201d<\/a> displaying the same image as \u201c<a href=\"https:\/\/github.com\/fairskyDev0201\">fairskyDev0201<\/a>.\u201d<\/p>\n<p>Other examples of this type of activity are listed\u00a0below:<\/p>\n<p>Repositories with suspicious activity<\/p>\n<p>&#8211; https:\/\/github.com\/typescript-cheatsheets\/react\/issues\/57<br \/>&#8211; https:\/\/github.com\/typescript-cheatsheets\/react\/issues\/190<br \/>&#8211; https:\/\/github.com\/typescript-cheatsheets\/react\/issues\/167<br \/>&#8211; https:\/\/github.com\/typescript-cheatsheets\/react\/issues\/12<br \/>&#8211; https:\/\/github.com\/mckaywrigley\/chatbot-ui\/issues\/224<br \/>&#8211; https:\/\/github.com\/orgs\/community\/discussions\/69532<br \/>&#8211; https:\/\/github.com\/typescript-cheatsheets\/react\/issues\/87<br \/>&#8211; https:\/\/github.com\/typescript-cheatsheets\/react\/issues\/63<br \/>&#8211; https:\/\/github.com\/unicodeveloper\/awesome-nextjs\/issues\/179<\/p>\n<p>Similarly, it\u2019s worth noting that in these repositories, there are accounts that seem to be linked to this suspicious activity. (It\u2019s possible that they are trying to build history and credibility by commenting on these older\u00a0posts).<\/p>\n<p>Below are some accounts that are active in these repositories and which we consider suspicious:<\/p>\n<p>Suspicious accounts commiting in these repositories<\/p>\n<p>https:\/\/github.com\/ericbrown2716<br \/>https:\/\/github.com\/peterjohnson4987<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/Yoshidayoshi23<br \/>https:\/\/github.com\/coopfeathy<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/EugeneYoona<br \/>https:\/\/github.com\/fairskyDev0201   <br \/>https:\/\/github.com\/bernssolg<br \/>https:\/\/github.com\/erinodev<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/Linda423<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209<br \/>https:\/\/github.com\/genie4viz<br \/>https:\/\/github.com\/chivalrousdev<br \/>https:\/\/github.com\/erinodev<br \/>https:\/\/github.com\/petardev101<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/kevindavies8<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/ericbrown2716<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/coopfeathy<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/EugeneYoona<br \/>https:\/\/github.com\/fairskyDev0201<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/alisenola<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/Linda423<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209 <br \/>https:\/\/github.com\/genie4viz<br \/>https:\/\/github.com\/hussammousa68<br \/>https:\/\/github.com\/zeus-soft-world<br \/>https:\/\/github.com\/erinodev<br \/>https:\/\/github.com\/petardev101<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/kevindavies8<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/ericbrown2716<br \/>https:\/\/github.com\/peterjohnson4987<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/Yoshidayoshi23<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/coopfeathy<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/xbucks<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/EugeneYoona<br \/>https:\/\/github.com\/fairskyDev0201<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/alisenola<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/Linda423<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209  <br \/>https:\/\/github.com\/genie4viz<br \/>https:\/\/github.com\/hussammousa68<br \/>https:\/\/github.com\/zeus-soft-world<br \/>https:\/\/github.com\/chivalrousdev<br \/>https:\/\/github.com\/erinodev<br \/>https:\/\/github.com\/petardev101<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/ericbrown2716<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/xbucks<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/EugeneYoona<br \/>https:\/\/github.com\/fairskyDev0201<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/alisenola<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/Linda423<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209<br \/>https:\/\/github.com\/genie4viz<br \/>https:\/\/github.com\/chivalrousdev<br \/>https:\/\/github.com\/petardev101<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/kevindavies8<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/Yoshidayoshi23<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/fairskyDev0201<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/alisenola<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209<br \/>https:\/\/github.com\/mirdavion<br \/>https:\/\/github.com\/codingzeus1218999<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/sphinxDevVic<br \/>https:\/\/github.com\/SmartDev555<br \/>https:\/\/github.com\/crypto-artisan<br \/>https:\/\/github.com\/Watcher919<\/p>\n<p>These accounts, which engage in this type of activity combined with joining certain organizations, share characteristics that we\u2019ve previously identified. Additionally, many of these accounts follow each other, raising further suspicion about the intentionality behind this artificial activity on these GitHub profiles, which are typically associated with developers focused on Blockchain, Full Stack, and\u00a0Web3.<\/p>\n<h3>Part 3: Cluster of Older GitHub\u00a0Accounts<\/h3>\n<p>An important aspect to note regarding the accounts displaying this type of activity is that some appear to be stolen, as they retain the data and information of the previous user. Others use fake identities with accounts less than two years old, while some accounts show a much older creation\u00a0history.<\/p>\n<p>It has recently been observed that the use of these older accounts has expanded within this network of fake \u201cdevelopers,\u201d as they appear to generate more credibility and\u00a0trust.<\/p>\n<p>Upon reviewing the activity of these accounts, we found one account (<a href=\"https:\/\/github.com\/Sayonara01\">https:\/\/github.com\/Sayonara01<\/a>) with 13k followers, which is particularly notable as it follows a large number of similar accounts\u200a\u2014\u200aeither empty or with little activity\u200a\u2014\u200aand its only follower is the mentioned account (Sayonara) a \u201cFull stack\u00a0Dev\u201d:<\/p>\n<p><a href=\"https:\/\/github.com\/Sayonara01\">https:\/\/github.com\/Sayonara01<\/a><\/p>\n<p>This makes the account a point of interest, as it hosts a large number of these \u201cfarmed\u201d accounts.<\/p>\n<p>Below are several accounts (followed by Sayonara) that indicate they are part of a network. It is important to note that these accounts have greater age, limited activity, and are relatively new to be in\u00a0use:<\/p>\n<p>Example of older\u00a0accounts<\/p>\n<p>As evidenced, the only profile following all these suspicious accounts is Sayonara01. Below is a sample of the accounts followed by Sayonara, which also meet the characteristics of having little to no activity, being quite old, and being followed by <a href=\"https:\/\/github.com\/Sayonara01\">Sayonara01<\/a>:<\/p>\n<p>Given that Sayonara follows approximately 13k accounts, the volume of these types of accounts is quite high. Here is a small sample of these accounts that are used for various suspicious activities:<\/p>\n<p>e.g Accounts farmed by suspicious profile<\/p>\n<p>https:\/\/github.com\/operkins<br \/>https:\/\/github.com\/KimBrown<br \/>https:\/\/github.com\/JenniferYoung<br \/>https:\/\/github.com\/christian48<br \/>https:\/\/github.com\/keith16<br \/>https:\/\/github.com\/Clarkwendy<br \/>https:\/\/github.com\/sandovalandrew<br \/>https:\/\/github.com\/coreygonzales<br \/>https:\/\/github.com\/christian48<br \/>https:\/\/github.com\/kwells<br \/>https:\/\/github.com\/Brian35<br \/>https:\/\/github.com\/Gavin50<br \/>https:\/\/github.com\/jay39<br \/>https:\/\/github.com\/christiancampos<br \/>https:\/\/github.com\/JesusMorgan<br \/>https:\/\/github.com\/dnichols<br \/>https:\/\/github.com\/mirandacraig<br \/>https:\/\/github.com\/Kristen36<br \/>https:\/\/github.com\/lmorris<br \/>https:\/\/github.com\/michaelascott<br \/>https:\/\/github.com\/Annette71<br \/>https:\/\/github.com\/bonnie77<br \/>https:\/\/github.com\/Leonard48<br \/>https:\/\/github.com\/elizabethwagner<br \/>https:\/\/github.com\/samanthabailey<br \/>https:\/\/github.com\/Colleen41<br \/>https:\/\/github.com\/brian91<br \/>https:\/\/github.com\/brianroberts<br \/>https:\/\/github.com\/james10<br \/>https:\/\/github.com\/groberts<br \/>https:\/\/github.com\/jordanmorales<br \/>https:\/\/github.com\/jacksonwilliam<br \/>https:\/\/github.com\/anna26<br \/>https:\/\/github.com\/jessicasmall<br \/>https:\/\/github.com\/Tiffany90<br \/>https:\/\/github.com\/gabriel56<br \/>https:\/\/github.com\/NicholasWarner<br \/>https:\/\/github.com\/Christina70<br \/>https:\/\/github.com\/vanessa56<br \/>https:\/\/github.com\/hyang<br \/>https:\/\/github.com\/jordanmorales<br \/>https:\/\/github.com\/jacksonwilliam<br \/>https:\/\/github.com\/anna26<br \/>https:\/\/github.com\/Carl92<br \/>https:\/\/github.com\/randysnyder<br \/>https:\/\/github.com\/thomasparker<br \/>https:\/\/github.com\/ashleykelsey<br \/>https:\/\/github.com\/KaneGregory<br \/>https:\/\/github.com\/SIMONDAVID<br \/>https:\/\/github.com\/lreyes<br \/>https:\/\/github.com\/eric39<br \/>https:\/\/github.com\/vhenry<br \/>https:\/\/github.com\/Mark33<\/p>\n<p>Based on this list and analyzing some profiles, we have observed that they aim to build credibility and association by attempting to make commits in Web3-related projects and repositories.<\/p>\n<p>We have also seen that this account (sayonara) following the activity of other important GitHub accounts related to web3 projects.<\/p>\n<h3>Part 4: Suspicious interactions of these accounts across different repositories (Seeking-job behavior)<\/h3>\n<p>By analyzing different account clusters, we\u2019ve identified certain accounts that are more actively attempting to collaborate or make PRs\/commits in projects, primarily within the Web3 industry.<\/p>\n<p>Below, we\u2019ll provide evidence of accounts that exhibit visual characteristics similar to those previously mentioned. These accounts tend to follow one another, often with just one or two intermediary connections. In many cases, they can be traced through their followers, following lists, stars, or even the commits they share across their repositories.<\/p>\n<p>Here are some examples of these accounts interacting with various projects, most of which are within the Web3 industry:<\/p>\n<h4>Example 1:<\/h4>\n<p>In this case, the profile \u201cdev0614\u201d has certain characteristics in its GitHub handle, as well as in the description of its\u00a0bio:<\/p>\n<p><a href=\"https:\/\/github.com\/dev0614\">https:\/\/github.com\/dev0614<\/a><\/p>\n<p>This account attempts to make a PR in the following repository but receives a negative response from the repository owner, as the account does not belong to the\u00a0company:<\/p>\n<p><a href=\"https:\/\/github.com\/mgguild\/ai-games\/issues\/79\">https:\/\/github.com\/mgguild\/ai-games\/issues\/79<\/a><\/p>\n<h4>Example 2:<\/h4>\n<p>The account <a href=\"https:\/\/github.com\/Oyase-shinobi\">Oyase-shinobi<\/a> also exhibits similar behavior by attempting to actively participate in\u00a0projects<\/p>\n<p>This account shows more activity; in this case, it interacts with\u00a0<a href=\"https:\/\/github.com\/lira-dao\">LiraDAO<\/a>:<\/p>\n<p><a href=\"https:\/\/github.com\/lira-dao\/ecosystem\/issues\/56\">https:\/\/github.com\/lira-dao\/ecosystem\/issues\/56<\/a><\/p>\n<p>Another example of this unusual \u201chungry-job\u201d behavior is as follows, directed towards <a href=\"https:\/\/github.com\/junobuild\">Juno\u00a0Build<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/junobuild\/create-juno\/issues\/39\">https:\/\/github.com\/junobuild\/create-juno\/issues\/39<\/a><\/p>\n<h4>Example 3:<\/h4>\n<p>Another example that highlights the intent of these accounts to gain access and collaborate on these projects is the activity of the account <a href=\"https:\/\/github.com\/kentaurse\">kentaurse<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/kentaurse\">https:\/\/github.com\/kentaurse<\/a><\/p>\n<p>This account attempts to interact with <a href=\"https:\/\/github.com\/darwinia-network\/home\/issues\/370\">darwinia-network<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/darwinia-network\/home\/issues\/370\">https:\/\/github.com\/darwinia-network\/home\/issues\/370<\/a>In addition, we have observed how some accounts have focused their efforts on various projects, which has led to the creation of clusters of suspicious accounts attempting to interact with certain repositories.s.<\/p>\n<h3>Part 5: Suspicious Accounts with High Incidence and Activity related to \u201cWagMole\u201d campaign<\/h3>\n<p>This chapter is reserved due to requests from individuals who wish to keep their names and company details confidential. However, for research and intelligence purposes, it is important to share the modus operandi of these profiles and how they are managing to gain access to various projects.<\/p>\n<p>The following will present specific cases that highlight activity related to the DPRK IT Workers \u201cWagMole\u201d campaign on GitHub and how these actors are successfully infiltrating and securing roles with Web3 companies:<\/p>\n<h4>Case 1: Suspicious accounts interacting with developer<\/h4>\n<p><strong>Target: Developer\u200a\u2014\u200a<\/strong><a href=\"https:\/\/www.linkedin.com\/in\/tupui\/\"><strong>https:\/\/www.linkedin.com\/in\/tupui\/<\/strong><\/a><\/p>\n<p>Upon reviewing the activity of the account mentioned in the previous case, which uses the GitHub handle <strong>\u201ckindsecret,\u201d<\/strong> we found another account interacting with it. As evidenced in this repository, <strong>the account \u201c0xexp-po\u201d attempts to merge the pull request from \u201ckindsecret\u201d<\/strong>.<\/p>\n<p><a href=\"https:\/\/github.com\/0xExp-po\/dharmaverse-web3\/commits\/main\/\">https:\/\/github.com\/0xExp-po\/dharmaverse-web3\/commits\/main\/<\/a><\/p>\n<p>This account, which attempts to merge the pull request from \u201ckindsecret,\u201d is:<\/p>\n<p><a href=\"https:\/\/github.com\/0xexp-po\">https:\/\/github.com\/0xexp-po<\/a><\/p>\n<p>This profile also displays what we have previously identified as \u201chungry job behavior,\u201d showing an overwhelming intention to work and collaborate on other projects. Some examples of this behavior are outlined\u00a0here.<\/p>\n<p>This profile attempts to interact with <a href=\"https:\/\/github.com\/orgs\/luanlabs\">Luan Labs<\/a> by making a suggestion in the repository of this\u00a0project<\/p>\n<p><a href=\"https:\/\/github.com\/orgs\/luanlabs\/discussions\/62\">https:\/\/github.com\/orgs\/luanlabs\/discussions\/62<\/a><\/p>\n<p>Other example of this account trying to colaborate in <a href=\"https:\/\/github.com\/myneTEC\">MyneTEC<\/a> a Social Media Mining\u00a0Company<\/p>\n<p><a href=\"https:\/\/github.com\/myneTEC\/MAR\/issues\/2\">https:\/\/github.com\/myneTEC\/MAR\/issues\/2<\/a><\/p>\n<p>Other example of this account actively trying to engage is in FOSSASIA (Open Technologies developed in Asia and Around the\u00a0Globe)<\/p>\n<p><a href=\"https:\/\/github.com\/fossasia\/open-event-frontend\/issues\/9192\">https:\/\/github.com\/fossasia\/open-event-frontend\/issues\/9192<\/a><\/p>\n<p>Additionally, it is evident that <strong>the account \u201c0xexp-p\u201d makes several contributions to this repository called: <\/strong><a href=\"https:\/\/github.com\/tupui\/soroban-versioning\"><strong>soroban-versioning<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/github.com\/tupui\/soroban-versioning\/commits?author=0xExp-po&amp;since=2024-12-01&amp;until=2024-12-25\">https:\/\/github.com\/tupui\/soroban-versioning\/commits?author=0xExp-po&amp;since=2024-12-01&amp;until=2024-12-25<\/a><\/p>\n<p>It seems that this person was hired by <a href=\"https:\/\/github.com\/tupui\">tupui<\/a> to develop some of his projects, according to the interactions in these repositories:<\/p>\n<p><a href=\"https:\/\/github.com\/tupui\/soroban-versioning\/pull\/38\">https:\/\/github.com\/tupui\/soroban-versioning\/pull\/38<\/a>This repository is owned by Pamphile Roy\u200a\u2014\u200a<a href=\"https:\/\/github.com\/tupui\">https:\/\/github.com\/tupui<\/a><a href=\"https:\/\/github.com\/tupui\">https:\/\/github.com\/tupui<\/a><\/p>\n<p>According to their LinkedIn profile, their name is Pamphile Roy, and he is a <a href=\"https:\/\/www.linkedin.com\/in\/tupui\/\">Senior Software Engineer at\u00a0Bitpanda<\/a><\/p>\n<p>The full extent of the activity from this <a href=\"https:\/\/github.com\/0xexp-po\">0xexp-p<\/a> account remains unclear, but it is evident that the activity is primarily focused on Web3 projects. In this particular case, the account seems to be targeting a developer from this exchange, suggesting that they may be interested in gaining access to this individual or the get financial compansated by their\u00a0work.<\/p>\n<p>This interaction could potentially have long-term consequences, especially considering that their activity might remain dormant for months or years, either with financial motives or, in the worst-case scenario, aiming to gain access to these projects-companies.<\/p>\n<p>We have seen cases where the developer\u2019s environment can be compromised, so there is a high risk that an exchange of infected files can trigger several negative aspects at the security level for the company where he\u00a0works.<\/p>\n<h4>Case 2: Suspicious account participating in a\u00a0DAO<\/h4>\n<p><strong>Target: ProductShare DAO\u200a\u2014\u200a<\/strong><a href=\"https:\/\/x.com\/iproductshare\">https:\/\/x.com\/iproductshare<\/a><\/p>\n<p>This case is related to two accounts that were previously mentioned in this part of the investigation. In the profile of <a href=\"https:\/\/github.com\/kindsecret\">https:\/\/github.com\/kindsecret<\/a>, there is a repository named rust-HackerRank<\/p>\n<p><a href=\"https:\/\/github.com\/kindsecret\/rust-HackerRank\">https:\/\/github.com\/kindsecret\/rust-HackerRank<\/a><\/p>\n<p>In this repository, the GitHub account \u201cToptalhook\u201d contributes<\/p>\n<p><a href=\"https:\/\/github.com\/toptalhook\">https:\/\/github.com\/toptalhook<\/a><\/p>\n<p>Similarly, we see this same account interacting with <a href=\"https:\/\/github.com\/0xexp-po\">0xexp-p\u00a0o<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/toptalhook\/crypto-scanner\/discussions\/1\">https:\/\/github.com\/toptalhook\/crypto-scanner\/discussions\/1<\/a><\/p>\n<p>This profile had also been mentioned earlier due to its suspicious activity<\/p>\n<p><a href=\"https:\/\/github.com\/0xExp-po\">https:\/\/github.com\/0xExp-po<\/a><\/p>\n<p>Therefore, toptalhook interacts with <a href=\"https:\/\/github.com\/0xExp-po\">https:\/\/github.com\/0xExp-po<\/a> and <a href=\"https:\/\/github.com\/kindsecret\">https:\/\/github.com\/kindsecret<\/a>. Given this connection between these accounts, we will now analyze the <a href=\"https:\/\/github.com\/toptalhook\">toptalhook<\/a> profile:<\/p>\n<p><a href=\"https:\/\/github.com\/toptalhook\">https:\/\/github.com\/toptalhook<\/a><\/p>\n<p>In their repositories, there is a CV with the following identity:<br \/>Kai De Tan\u200a\u2014\u200atoptall.cook@gmail.com<\/p>\n<p><a href=\"https:\/\/github.com\/toptalhook\/MyPortfolio\/blob\/d1259b1358162eee70ed93968e810fb871c95fef\/public\/KaiDe-resume.pdf\">https:\/\/github.com\/toptalhook\/MyPortfolio\/blob\/d1259b1358162eee70ed93968e810fb871c95fef\/public\/KaiDe-resume.pdf<\/a><\/p>\n<p>Additionally, this other style of CV with the same identity is\u00a0found:<\/p>\n<p><a href=\"https:\/\/github.com\/toptalhook\/MyPortfolio\/blob\/d1259b1358162eee70ed93968e810fb871c95fef\/public\/readme-images\/portfolio.png\">https:\/\/github.com\/toptalhook\/MyPortfolio\/blob\/d1259b1358162eee70ed93968e810fb871c95fef\/public\/readme-images\/portfolio.png<\/a><\/p>\n<p>However, this account is also using another CV where it identifies as Julio Acin from\u00a0Spain.<\/p>\n<p><a href=\"https:\/\/github.com\/toptalhook\/MyPortfolio\/blob\/d1259b1358162eee70ed93968e810fb871c95fef\/public\/julioacin-resume1.pdf\">https:\/\/github.com\/toptalhook\/MyPortfolio\/blob\/d1259b1358162eee70ed93968e810fb871c95fef\/public\/julioacin-resume1.pdf<\/a><\/p>\n<p>When searching on GitHub for the email address used in this CV, noahsflood908@gmail.com, we found an account that uses this same email, as shown\u00a0here:<\/p>\n<p><a href=\"https:\/\/github.com\/search?q=noahsflood908&amp;type=code\">https:\/\/github.com\/search?q=noahsflood908&amp;type=code<\/a><\/p>\n<p>The account using this same email as its personal identity is called \u201cSweetdream.\u201d This account also links to a LinkedIn profile under the name <a href=\"https:\/\/www.linkedin.com\/in\/iwakihiroto?miniProfileUrn=urn%3Ali%3Afsd_profile%3AACoAADkZRYcBmKI6l7Y7U2xuAjc56g_gUtjVm2Y\">Hiroto Iwaki<\/a>, located in\u00a0Japan<\/p>\n<p><a href=\"https:\/\/github.com\/mymiracle0118\">https:\/\/github.com\/mymiracle0118<\/a><\/p>\n<p>This account also uses the same identity of \u201cJulio Acin\u201d in its portfolio<\/p>\n<p><a href=\"https:\/\/github.com\/mymiracle0118\/MyPorfolio\/blob\/main\/public\/readme-images\/portfolio.png\">https:\/\/github.com\/mymiracle0118\/MyPorfolio\/blob\/main\/public\/readme-images\/portfolio.png<\/a><\/p>\n<p>Within their GitHub profile, there is a repository named \u201c<a href=\"https:\/\/github.com\/mymiracle0118\/Automation-Bot\/tree\/c152bb25d5779ca8666078d7346592ddb75f46d3\">Automation-Bot<\/a>,\u201d where multiple CVs of other identities used by this account can be\u00a0found:<\/p>\n<p><a href=\"https:\/\/github.com\/mymiracle0118\/Automation-Bot\/tree\/c152bb25d5779ca8666078d7346592ddb75f46d3\/source\/resumes\">https:\/\/github.com\/mymiracle0118\/Automation-Bot\/tree\/c152bb25d5779ca8666078d7346592ddb75f46d3\/source\/resumes<\/a><\/p>\n<p>It is highly likely that the account using the name \u201cJulio Acin\u201d is being utilized on UpWork, as there are some details associated with this account found in this repository:<\/p>\n<p><a href=\"https:\/\/github.com\/mymiracle0118\/Automation-Bot\/blob\/c152bb25d5779ca8666078d7346592ddb75f46d3\/source\/signupverify.csv\">https:\/\/github.com\/mymiracle0118\/Automation-Bot\/blob\/c152bb25d5779ca8666078d7346592ddb75f46d3\/source\/signupverify.csv<\/a><\/p>\n<p>An additional detail is that their LinkedIn profile, \u201c<a href=\"https:\/\/github.com\/mymiracle0118\">mymiracle0118<\/a>,\u201d also seems to show a strong intention of seeking employment.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/iwakihiroto\/recent-activity\/all\/\">https:\/\/www.linkedin.com\/in\/iwakihiroto\/recent-activity\/all\/<\/a><\/p>\n<p>On their LinkedIn, their activity in ProductShare DAO is referenced<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/posts\/iwakihiroto_productshare-dao-governance-council-is-activity-7272038373282734081-VqOz?utm_source=share&amp;utm_medium=member_desktop\">https:\/\/www.linkedin.com\/posts\/iwakihiroto_productshare-dao-governance-council-is-activity-7272038373282734081-VqOz?utm_source=share&amp;utm_medium=member_desktop<\/a><\/p>\n<p>ProductShare it is developing products in blockchain as they\u00a0stated:<\/p>\n<p><a href=\"https:\/\/x.com\/iproductshare\">https:\/\/x.com\/iproductshare<\/a><\/p>\n<p>ProductShare DAO is composed of various people and projects, and they also play a role as stakeholders<\/p>\n<p><a href=\"https:\/\/info.productshare.co\/productshare-dao-council-is-live?p=13aa6276405e80a38df3d10c2f8050bb&amp;pm=s\">https:\/\/info.productshare.co\/productshare-dao-council-is-live?p=13aa6276405e80a38df3d10c2f8050bb&amp;pm=s<\/a><\/p>\n<p>According to this DAO, there are different categories regarding who makes it\u00a0up:<\/p>\n<p>Considering this composition, we see that <strong>Hiroto Iwaki<\/strong> is listed as a co-creator and holds 500,000 stake\u00a0shares<a href=\"https:\/\/info.productshare.co\/productshare-dao-council-is-live\">https:\/\/info.productshare.co\/productshare-dao-council-is-live<\/a><\/p>\n<p>The URL of his personal site, which he uses to identify himself within this DAO,\u00a0is:<\/p>\n<p><a href=\"https:\/\/www.iwakihiroto.info\/\">https:\/\/www.iwakihiroto.info\/<\/a><\/p>\n<p>Similarly, it is worth highlighting that other Web3 projects, such as ReFi Tulum, Hedgey Finance, and others, are also part of this DAO. These are significant initiatives where these profiles have managed to make an\u00a0impact<\/p>\n<p><a href=\"https:\/\/info.productshare.co\/productshare-dao-council-is-live\">https:\/\/info.productshare.co\/productshare-dao-council-is-live<\/a>The activity of this account clearly indicates that it is a fraudulent profile due to the number of different identities it uses. Additionally, as we\u2019ve shown, there are numerous irregularities linked to this account, suggesting the possibility that its involvement in this DAO may have been under a fraudulent identity.<\/p>\n<p>Further evidence of its intent to seek employment can be seen in the following case on\u00a0Fiverr:<\/p>\n<p><a href=\"https:\/\/www.fiverr.com\/iwakihiroto\/work-as-a-blockchain-developer-and-auditor\">https:\/\/www.fiverr.com\/iwakihiroto\/work-as-a-blockchain-developer-and-auditor<\/a><\/p>\n<p>This profile is also listed on a Japanese employment website:<\/p>\n<p><a href=\"https:\/\/sg.wantedly.com\/id\/sweetdream0118\">https:\/\/sg.wantedly.com\/id\/sweetdream0118<\/a><\/p>\n<p>Given the numerous irregularities, there is a significant risk of long-term negative impacts on these projects if an individual with fraudulent identities becomes part of this\u00a0DAO.<\/p>\n<h4>Case 3: Threat Actors Disguised as Developers building\u00a0TaraSwap<\/h4>\n<p><strong>Target: TaraSwap\u200a\u2014\u200a<\/strong><a href=\"https:\/\/www.taraswap.app\/\"><strong>https:\/\/www.taraswap.app\/<\/strong><\/a><\/p>\n<p>This case involves an individual from the Taraxa project who, along with an external team, developed TaraSwap. In this instance, we believe Threat Actors Disguised as Developers were involved in building\u00a0TaraSwap<\/p>\n<p>Some developers behind the TaraSwap project may be related to North Korean threat actors posing as developers<\/p>\n<p>Tracking this account reveals repositories [finalgoal231] that we have previously connected to DPRK threat actors\u200a\u2014\u200aIT\u00a0workers.<\/p>\n<p><a href=\"https:\/\/github.com\/0x66eth\">https:\/\/github.com\/0x66eth<\/a><\/p>\n<p>This profile is actually in the organization we previous found to be hosted by fake profiles simulating a work-job enviroment:<\/p>\n<p><a href=\"https:\/\/github.com\/Finalgoal231\">https:\/\/github.com\/Finalgoal231<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/Finalgoal231\">The members of this organization<\/a> are entirely fabricated and controlled by other members of this same organization<\/p>\n<p>We already have mentioned the presence of this account (Onder Kayabasi) in previous investigations following one account in this organization: <a href=\"https:\/\/github.com\/Luis96920\">https:\/\/github.com\/Luis96920<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/firststar19950115\">https:\/\/github.com\/firststar19950115<\/a><\/p>\n<p><a href=\"https:\/\/unit42.paloaltonetworks.com\/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters\/\">The profile Onder kayabasi was already reported to be related to DPRK Threat Actors, luring tech industry job seekers to install new variants of BeaverTail and InvisibleFerret Malware.<\/a><\/p>\n<p>The activities of this organization (<a href=\"https:\/\/github.com\/Finalgoal231\">finalgoal231<\/a>) and its associated profiles are part of a network of GitHub accounts that seem to be shifting focus from their previous activity of \u201chiring\u201d to seeking employment, primarily in Web3-related roles.<\/p>\n<p>After analyzing the activity of the profile <a href=\"https:\/\/github.com\/0x66eth\">https:\/\/github.com\/0x66eth<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/0x66eth\">https:\/\/github.com\/0x66eth<\/a><\/p>\n<p>We are aware of certain accounts within this network of fake profiles claiming to be developers<\/p>\n<p>The account 0x66eth is following 2 github profiles with some interesting activity regarding their commits, behavior, following, personal information, and previous intelligence we\u00a0gathered<\/p>\n<p>Accounts with similar\u00a0behavior<\/p>\n<p>Our focus will be <a href=\"https:\/\/github.com\/joyfulmagician\">joyfulmagician<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/joyfulmagician\">https:\/\/github.com\/joyfulmagician<\/a><\/p>\n<p>His activity appears somewhat inconsistent, with a clear focus on seeking employment opportunities.<\/p>\n<p>Repository in his account:\u00a0<a href=\"https:\/\/github.com\/joyfulmagician\/JobApply\">JobApply<\/a><\/p>\n<p>Key aspects to highlight include the high number of accounts following him, the accounts he follows, the extended periods of inactivity, and the fact that his only commit aligns directly with the purpose of this investigation<\/p>\n<h4>Relation with Taraxa-Taraswap:<\/h4>\n<p><a href=\"https:\/\/taraxa.io\/\">https:\/\/taraxa.io\/<\/a><\/p>\n<p>Taraxa is a purpose-built, fast &amp; scalable Layer-1 public ledger designed to help democratize reputation by making informal data trustworthy.<\/p>\n<p>Within his ecosystem, there are several projects and upcoming launches with specific\u00a0dates:<\/p>\n<p><a href=\"https:\/\/x.com\/taraxa_project\/status\/1851655325562044661\/photo\/1\">https:\/\/x.com\/taraxa_project\/status\/1851655325562044661\/photo\/1<\/a><\/p>\n<p>In this launch, taraSwap is our subject of analysis, taking into account certain characteristics of the project, as well as the developers and dynamics surrounding it, which raise suspicions that it may have been developed by DPRK IT\u00a0workers<\/p>\n<h4>What is T<a href=\"https:\/\/x.com\/Tara_Swap\">araSwap<\/a>?<\/h4>\n<p><a href=\"https:\/\/whitepaper.taraswap.org\/docs\">Taraswap<\/a> is the first yield-centric DEX on\u00a0Taraxa.<\/p>\n<p><a href=\"https:\/\/www.taraswap.app\/\">https:\/\/www.taraswap.app\/<\/a><\/p>\n<p>It also link to his GitHub repository<\/p>\n<p><a href=\"https:\/\/github.com\/Taraswap\">https:\/\/github.com\/Taraswap<\/a><\/p>\n<p>The telegram channel of TaraSwap is <a href=\"https:\/\/t.me\/taraswap\">https:\/\/t.me\/taraswap<\/a><\/p>\n<p><a href=\"https:\/\/t.me\/taraswap\">https:\/\/t.me\/taraswap<\/a><\/p>\n<h4>Relation between TaraSwap and\u00a0Taraxa:<\/h4>\n<p>Based on the telegram conversation the taraSwap is not runned by the core\u00a0team.<\/p>\n<p>Later the admin of the Taraxa project in the Telegram channel confirms this information:<\/p>\n<p>Likewise, El\u0151d Varga seems to be in charge of this team based on the telegram chat conversations in the Taraxa\u00a0project.<\/p>\n<p>Thus, it was managed by Elrod as a third-party team, but it is not the core team behind the development of this project. They have mentioned this repeatedly in the Taraxa Telegram chat, which seems\u00a0unusual.He is also the admin in the<a href=\"https:\/\/t.me\/taraswap\"> TaraSwap channel<\/a> and the team behind the TaraSwap claim that <strong>El\u0151d Varga represents them<\/strong><a href=\"https:\/\/t.me\/taraswap\">https:\/\/t.me\/taraswap<\/a><\/p>\n<p>The owner of the telegram channel: 0xCore\u00a0TSWAP<\/p>\n<p><a href=\"https:\/\/t.me\/DevZi1la\">https:\/\/t.me\/DevZi1la<\/a><\/p>\n<p>The telegram handle [DevZi1a] match the GitHub account building\u00a0TaraSwap<\/p>\n<p><a href=\"https:\/\/github.com\/DevZi1la\">https:\/\/github.com\/DevZi1la<\/a><\/p>\n<p>The GitHub account responsible for building a significant part of TaraSwap was created on April 12,\u00a02024:<\/p>\n<p>Furthermore, there is little information available about this account beyond its involvement with the taraSwap project, which is unusual for a developer, considering the personal recognition typically associated with such\u00a0work.<\/p>\n<p>This behavior is abnormal, and it is also strange that the developers have a representative (El\u0151d Varga represents them) and work as a closed team. This raises further suspicions about their reasons for remaining hidden or anonymous.<\/p>\n<h4>joyfulmagician and TaraSwap:<\/h4>\n<p>As mentioned earlier, the account \u201c<a href=\"https:\/\/github.com\/joyfulmagician\">joyfulmagician<\/a>\u201d had previously been reported for suspicious behavior associated with this network of fake accounts posing as developers which seems to be linked with DPRK threat actors, as seen in previous investigations<\/p>\n<p>In this context, the account\u2019s involvement in TaraSwap is observed since july-24\u20132024:<\/p>\n<p><a href=\"https:\/\/github.com\/Uniswap\/interface\/compare\/main...taraswap:taraswap-interface:main\">https:\/\/github.com\/Uniswap\/interface\/compare\/main&#8230;taraswap:taraswap-interface:main<\/a><\/p>\n<p>This means that the account <a href=\"https:\/\/github.com\/joyfulmagician\">https:\/\/github.com\/joyfulmagician<\/a> has made multiple commits to the taraSwap repository, establishing them as a developer of the\u00a0project.<\/p>\n<h4>TaraSwap and El\u0151d\u00a0Varga<\/h4>\n<p>Many conversations on Telegram suggest that El\u0151d Varga is familiar with the development team and maintains contact with them. However, the development team remains invisible for reasons that seem\u00a0odd<\/p>\n<p>We noticed some GitHub accounts that we had previously investigated, which are part of a network of \u201cfake developers\u201d linked to DPRK threat\u00a0actors.<\/p>\n<p><a href=\"https:\/\/github.com\/VargaElod23\">https:\/\/github.com\/VargaElod23<\/a><\/p>\n<p>Among El\u0151d Varga\u2019s followers are accounts that have been extensively investigated for being part of a network of fake accounts used to gain access to various projects and jobs, allowing them to be compensated as developers<\/p>\n<p><a href=\"https:\/\/github.com\/VargaElod23?tab=followers\">https:\/\/github.com\/VargaElod23?tab=followers<\/a><\/p>\n<p>Much of the activity of these accounts [<a href=\"https:\/\/github.com\/AI0228\">https:\/\/github.com\/AI0228<\/a>] &amp; [<a href=\"https:\/\/github.com\/warmice71\">https:\/\/github.com\/warmice71<\/a>] has been linked to generating engagement and following numerous accounts that exhibit specific patterns, behaviors, creation dates, activity levels, and other aspects under analysis.<\/p>\n<p>The connection becomes more significant when they\u2019re followed by a suspicious user, such as <a href=\"https:\/\/github.com\/AI0228\">AI0228<\/a> or <a href=\"https:\/\/github.com\/warmice71\">warmice71<\/a>, who doesn\u2019t rely on an autofollowback bot or similar automated tools.<\/p>\n<p>Similarly, it is worth highlighting a notable aspect of El\u0151d Varga\u2019s GitHub profile: some of his repositories related to \u201ctalent search.\u201d This repository contain keywords commonly used by accounts linked to North Korean threat actors to describe themselves in their GitHub\u00a0bios.<\/p>\n<p><a href=\"https:\/\/github.com\/VargaElod23\/talent-search\">https:\/\/github.com\/VargaElod23\/talent-search<\/a><\/p>\n<p>While these accounts massively follow others on GitHub, it has been observed that these same suspicious accounts also follow their\u00a0targets.<\/p>\n<h4>Contacted TaraSwap\u00a0team:<\/h4>\n<p>After uncovering these irregularities, we decided to contact the TaraSwap team, led by El\u0151d Varga, regarding this profile. He stated, <em>\u201cThis person was a freelancer the TaraSwap team used, but that\u2019s done\u201d.<\/em> Likewise,<em> <\/em>El\u0151d Varga acknowledged that the team was hired through third parties and confirmed that, after a thorough review, the contributed code was\u00a0safe.<\/p>\n<h4>Issues in TaraSwap:<\/h4>\n<p>Since January 10, several users have raised questions regarding the amount of tokens in circulation<\/p>\n<p>This suspicious activity was creating FUD, which led the team to issue a statement explaining what had happened. The statement explains that the attacker had exploited a \u2018vulnerability in our [Staker Module]\u2019:<\/p>\n<p><a href=\"https:\/\/t.me\/taraswap\">https:\/\/t.me\/taraswap<\/a><\/p>\n<p>This attack allowed the attacker to drain at least 4.5 TSWAP tokens and sell them, which negatively impacted the token\u2019s price. The statement also outlines the next steps following the exploit. Although the attack was on a smaller scale with minimal impact, projects like these can be easily exploited if we they don\u2019t know who is behind their development.<\/p>\n<p>Considering these details, we found that a significant portion of this project was built by this \u2018unknown developer,\u2019 who is linked to the accounts we monitor associated with DPRK IT workers focused on Web3 activity.<\/p>\n<p>In this case, while there was a \u2018small\u2019 exploit, there is a high likelihood that these developers may seek financial compensation by working for third parties. If the opportunity arises, they will likely aim for greater economic gains, potentially exploiting the projects they work on or targeting others they see as\u00a0viable.<\/p>\n<p>Based on the evidence presented, there are several concerns regarding the developers of this project and their possible identities. A particularly noteworthy aspect is the involvement of accounts such as \u2018AI0228\u2019 and \u2018warmice71,\u2019 which have been clearly identified as engaging in fraudulent activities on GitHub, including the use of fake profiles to pose as developers and secure work under false identities.<\/p>\n<h4>Case 4: GitHub Accounts interacting with the Stellar Foundation repositories<\/h4>\n<p><strong>Target: Stellar Foundation<\/strong><\/p>\n<p>An interesting aspect when analyzing the activity of several of these accounts is their expressed interest in various Stellar Foundation repositories. This can be seen in the following examples, where a series of accounts with numerous irregularities in their profiles attempt to contribute to several repositories.<\/p>\n<p><strong>Example 1:<\/strong><\/p>\n<p>The following example highlights the intentions of this account, which we had mentioned earlier\u00a0<a href=\"https:\/\/github.com\/dev0614\">dev0614<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/dev0614\">https:\/\/github.com\/dev0614<\/a><\/p>\n<p>They attempt to develop this commit in the Stellar repository called \u201claboratory\u201d:<\/p>\n<p><a href=\"https:\/\/github.com\/stellar\/laboratory\/issues\/916\">https:\/\/github.com\/stellar\/laboratory\/issues\/916<\/a><\/p>\n<p>Similarly, this account has also attempted to contribute to other projects. The following links provide several examples:<\/p>\n<p>https:\/\/github.com\/lira-dao\/ecosystem\/pull\/47<br \/>https:\/\/github.com\/Taraxa-project\/bridge\/issues\/20<br \/>https:\/\/github.com\/orgs\/yfosp\/discussions\/372<br \/>https:\/\/github.com\/ethglobal\/nextjs-wagmi-viem-starter\/discussions\/2<br \/>https:\/\/github.com\/mgguild\/ai-games\/issues\/79<br \/>https:\/\/github.com\/Taraxa-project\/bridge\/issues\/20<\/p>\n<p><strong>Example 2:<\/strong><\/p>\n<p>Another example is the account <a href=\"https:\/\/github.com\/Oyase-shinobi\">Oyase-shinobi<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/Oyase-shinobi\">https:\/\/github.com\/Oyase-shinobi<\/a><\/p>\n<p>Another example is the account, which on several occasions has attempted to contribute to Stellar Foundation projects<\/p>\n<p>different contributions<\/p>\n<p>The links where this account attempts to contribute are provided\u00a0below<\/p>\n<p>Issues:<br \/>stellar\/stellar-disbursement-platform-backend#348<br \/>stellar\/stellar-disbursement-platform-backend#102<br \/>stellar\/stellar-disbursement-platform-backend#410<\/p>\n<p>This same account also attempts to contribute to other projects.:<\/p>\n<p>  Other projects where this account contributes<br \/>  &#8211; https:\/\/github.com\/akash-network\/console\/issues\/354 <br \/>  &#8211; https:\/\/github.com\/lira-dao\/ecosystem\/issues\/56 <br \/>  &#8211; https:\/\/github.com\/junobuild\/create-juno\/issues\/39 <br \/>  &#8211; https:\/\/github.com\/paritytech\/polkadot-sdk\/issues\/5754 <br \/>  &#8211; https:\/\/github.com\/SpaceXpanse\/rod-rpc-explorer\/issues\/3 <\/p>\n<h3>Conclusion<\/h3>\n<p><strong>Potential Link Between Suspicious GitHub Accounts and the \u201cSuperStar\u201d Naming\u00a0Pattern<\/strong><\/p>\n<p>A key observation in the suspicious GitHub activity is the repeated use of the nicknames \u201cSuper\u201d and \u201cStar\u201d in GitHub handles, email addresses, and even bios. <a href=\"https:\/\/unit42.paloaltonetworks.com\/fake-north-korean-it-worker-activity-cluster\/\">Palo Alto\u2019s Indicators of Compromise (IOCs) also reveal this combination in email addresses<\/a>. Additionally, screenshots from these accounts suggest a personal connection to the term \u201cSuperStar,\u201d making it a fitting name for this cluster of accounts linked to the WageMole\u00a0campaign<\/p>\n<p><strong>Suspicious Activity on GitHub Linked to Certain\u00a0Accounts<\/strong><\/p>\n<p>Suspicious activity on GitHub has been observed, particularly with accounts that share specific characteristics previously identified in our investigations. These characteristics include profile appearance, personal description, GitHub handles, and even profile images. These accounts exhibit certain behavioral patterns, interacting with organizations in similar ways and within the same timeframe once these accounts are created. However, it is important to note that not all suspicious accounts engage in this type of activity.<\/p>\n<p><strong>Adaptive Behavior and \u201cOpen Source Contributor\u201d Profiles<\/strong><\/p>\n<p>One interesting aspect is how these accounts adapt based on ongoing trends. Several suspicious accounts have added \u201cOpen Source Contributor\u201d to their BIOS, which allows them to collaborate on repositories across different projects and blend in with the GitHub and Web3 communities.<\/p>\n<p><strong>Patterns and Coordination Across\u00a0Accounts<\/strong><\/p>\n<p>Curiously, some email addresses flagged by Palo Alto are strikingly similar to the GitHub handles we\u2019ve already monitored as suspicious, linking them to this campaign. There are multiple accounts interacting with older repositories to create a fa\u00e7ade of credibility. However, the mass and coordinated nature of their commits reveals similar patterns, and the same accounts, with their distinctive profile images and GitHub handles, are repeatedly involved.<\/p>\n<p><strong>Use of Older Accounts to Gain Credibility<\/strong><\/p>\n<p>We\u2019ve observed that some accounts have opted to use older profiles in an effort to gain more credibility and access collaboration opportunities or jobs. It appears that one account may be coordinating thousands of fake, stolen, or automatically generated profiles, as they share similarities with each other, and all are followed by just one\u00a0account.<\/p>\n<p><strong>Repetitive Comments and Self-Promotion<\/strong><\/p>\n<p>A notable aspect is the repetitive comments these accounts make when trying to collaborate on different projects. Their interest spans a wide range of projects, showcasing various skills. A clear pattern emerges as these accounts follow one another and even star each other\u2019s repositories, reinforcing their fabricated portfolios.<\/p>\n<p><strong>Examples of Fraudulent Commit\u00a0Attempts<\/strong><\/p>\n<p>There have been instances where accounts successfully made commits in projects. Our investigation, followed by confirmation from the project, revealed suspicious activity with these GitHub accounts.<\/p>\n<p><strong>Infiltration of ProductShare DAO<\/strong><\/p>\n<p>The account participating in ProductShare DAO has managed to infiltrate more closed spaces within the DAO. However, this information has not been shared with the\u00a0team.<\/p>\n<p><strong>TaraSwap Issues and Suspicious Developers<\/strong><\/p>\n<p>The individual responsible for TaraSwap has faced multiple issues in developing the project. Following the exploit, many aspects of the project ceased to function, and the community has lost trust in it. Additionally, Elod, the person in charge of TaraSwap, acknowledged not knowing this individual, who was hired by a third\u00a0party.<\/p>\n<p><strong>Focus on Stellar Foundation and Other\u00a0Projects<\/strong><\/p>\n<p>A number of accounts appear to target Stellar Foundation, as evidenced by the multiple suspicious accounts attempting to contribute to several of its repositories. Many of these accounts, recently participating in recruitment processes or seeking collaboration in projects, list Japan as their location in their portfolios. They also face difficulties in communication and interviews, which have been highlighted in previous investigations.<\/p>\n<p><strong>Cluster of Suspicious Accounts and Web3\u00a0Projects<\/strong><\/p>\n<p>A cluster of accounts has been attempting to contribute to other projects. Many of their PRs and commits remain open, and in some cases, these commits have been merged without verifying the identities behind them. In other projects, their contributions are ignored. Generally, these collaborations are accepted as \u201cnon-offensive,\u201d but the true intentions behind these \u201ccollaborations\u201d are unclear. Their focus on Web3 projects suggests that their ultimate goal may be financial gain.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<h3>Email Addresses<\/h3>\n<p>williamduncan91413@gmail.com<br \/>forever.xfactor@gmail.com<br \/>rainstorm.exp@gmail.com<br \/>toptall.cook@gmail.com<br \/>noahsflood908@gmail.com<br \/>yamamotozunki0815@gmail.com<br \/>shimamuratakehiko44@gmail.com<br \/>takutic.tech518@gmail.com<\/p>\n<h3>GitHub accounts:<\/h3>\n<p>https:\/\/github.com\/asseph<br \/>https:\/\/github.com\/thuongtruong1009<br \/>https:\/\/github.com\/Benjamin-cup<br \/>https:\/\/github.com\/Cardoso-topdev<br \/>https:\/\/github.com\/camillakathy<br \/>https:\/\/github.com\/erikerik116<br \/>https:\/\/github.com\/Kavorix<br \/>https:\/\/github.com\/Phoenix-Genius<br \/>https:\/\/github.com\/phoenix19950512<br \/>https:\/\/github.com\/smilephoenix103<br \/>https:\/\/github.com\/toptalhook<br \/>https:\/\/github.com\/uniwaydev<br \/>https:\/\/github.com\/creative2113<br \/>https:\/\/github.com\/SacredDever<br \/>https:\/\/github.com\/SacredDevKing<br \/>https:\/\/github.com\/GoldenDev176743<br \/>https:\/\/github.com\/dragonsea0927<br \/>https:\/\/github.com\/felipedev418<br \/>https:\/\/github.com\/techietrend<br \/>https:\/\/github.com\/popstar7<br \/>https:\/\/github.com\/Oyase-shinob<br \/>https:\/\/github.com\/dev0614<br \/>https:\/\/github.com\/shinevue<br \/>https:\/\/github.com\/fairsky0201<br \/>https:\/\/github.com\/Tru3Bliss<br \/>https:\/\/github.com\/talentDA0218<br \/>https:\/\/github.com\/BitFancy<br \/>https:\/\/github.com\/duskodev<br \/>https:\/\/github.com\/Chain-Reactor<br \/>https:\/\/github.com\/motokimasuo<br \/>https:\/\/github.com\/vuedev2113<br \/>https:\/\/github.com\/devstar829<br \/>https:\/\/github.com\/BlackStar816<br \/>https:\/\/github.com\/0xp3p3x0<br \/>https:\/\/github.com\/thinkingdev9<br \/>https:\/\/github.com\/Benjamin-cup<br \/>https:\/\/github.com\/LuckyBear0302<br \/>https:\/\/github.com\/happysmile007<br \/>https:\/\/github.com\/superdev947<br \/>https:\/\/github.com\/ITstar726<br \/>https:\/\/github.com\/MegaDev007<br \/>https:\/\/github.com\/GoldenDragon0830<br \/>https:\/\/github.com\/super622<br \/>https:\/\/github.com\/dragonsea0927<br \/>https:\/\/github.com\/honey0130<br \/>https:\/\/github.com\/popstar7<br \/>https:\/\/github.com\/forward012<br \/>https:\/\/github.com\/futurestar425<br \/>https:\/\/github.com\/SacredDever<br \/>https:\/\/github.com\/super9157<br \/>https:\/\/github.com\/dynamic612<br \/>https:\/\/github.com\/Luis96920<br \/>https:\/\/github.com\/CodeMaster1025<br \/>https:\/\/github.com\/bluedream74<br \/>https:\/\/github.com\/shinevue<br \/>https:\/\/github.com\/montedev0516<br \/>https:\/\/github.com\/felipedev418<br \/>https:\/\/github.com\/billy9821<br \/>https:\/\/github.com\/Lucky9596<br \/>https:\/\/github.com\/smartdev5050<br \/>https:\/\/github.com\/rainbowdev1359<br \/>https:\/\/github.com\/techietrend<br \/>https:\/\/github.com\/fairsky0201<br \/>https:\/\/github.com\/aybanda<br \/>https:\/\/github.com\/livedeveloper823<br \/>https:\/\/github.com\/Oyase-shinobi<br \/>https:\/\/github.com\/lucaslee129<br \/>https:\/\/github.com\/BTC415<br \/>https:\/\/github.com\/tothetop430<br \/>https:\/\/github.com\/daniellowe1027<br \/>https:\/\/github.com\/golden-lucky-monkey<br \/>https:\/\/github.com\/RealDiligentDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/ptc-bink<br \/>https:\/\/github.com\/dev7tech<br \/>https:\/\/github.com\/zhen1007<br \/>https:\/\/github.com\/agiledev0115<br \/>https:\/\/github.com\/smartdev914<br \/>https:\/\/github.com\/silver-coding-blockchain<br \/>https:\/\/github.com\/ironcg20<br \/>https:\/\/github.com\/Elite314Dev<br \/>https:\/\/github.com\/OnlyForward0613<br \/>https:\/\/github.com\/hi-tech-AI<br \/>https:\/\/github.com\/wizard0918<br \/>https:\/\/github.com\/DreamBoy65<br \/>https:\/\/github.com\/talentDev10<br \/>https:\/\/github.com\/toptalhook<br \/>https:\/\/github.com\/mymiracle0118<br \/>https:\/\/github.com\/enthusiastdev121<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/shiny0110<br \/>https:\/\/github.com\/supersenior017<br \/>https:\/\/github.com\/sagadev2015<br \/>https:\/\/github.com\/SuperDev314<br \/>https:\/\/github.com\/smartman0307<br \/>https:\/\/github.com\/coolidev<br \/>https:\/\/github.com\/dev-captain<br \/>https:\/\/github.com\/superdev0826<br \/>https:\/\/github.com\/ToptenDev<br \/>https:\/\/github.com\/SuperHeroDev<br \/>https:\/\/github.com\/wizasol<br \/>https:\/\/github.com\/tp1845<br \/>https:\/\/github.com\/super101217<br \/>https:\/\/github.com\/ProspDev<br \/>https:\/\/github.com\/Tyrese-FullStackGenius<br \/>https:\/\/github.com\/dev0614<br \/>https:\/\/github.com\/lucky0612<br \/>https:\/\/github.com\/beaubeas<br \/>https:\/\/github.com\/futurestar425<br \/>https:\/\/github.com\/cryptovecom<br \/>https:\/\/github.com\/profreelancer222<br \/>https:\/\/github.com\/phoenix19950512<br \/>https:\/\/github.com\/SeniorDev0830<br \/>https:\/\/github.com\/livedeveloper823<br \/>https:\/\/github.com\/superman0052<br \/>https:\/\/github.com\/smartdev5050<br \/>https:\/\/github.com\/rainbowdev1359<br \/>https:\/\/github.com\/RandomSummer<br \/>https:\/\/github.com\/happydev0126<br \/>https:\/\/github.com\/MasterDev333<br \/>https:\/\/github.com\/CryptoNinja0331<br \/>https:\/\/github.com\/devincredible<br \/>https:\/\/github.com\/warmice71<br \/>https:\/\/github.com\/kallis312<br \/>https:\/\/github.com\/ninjadevtrack<br \/>https:\/\/github.com\/wizard0918<br \/>https:\/\/github.com\/luckwings<br \/>https:\/\/github.com\/top-web-talent<br \/>https:\/\/github.com\/talentDA0218<br \/>https:\/\/github.com\/SmartCodiDev<br \/>https:\/\/github.com\/deepakcode21<br \/>https:\/\/github.com\/fireman03151<br \/>https:\/\/github.com\/thinkingdev9<br \/>https:\/\/github.com\/LuckyBear0302<br \/>https:\/\/github.com\/rustsol114<br \/>https:\/\/github.com\/super622<br \/>https:\/\/github.com\/Gentlemen726<br \/>https:\/\/github.com\/CodeMaster1025<br \/>https:\/\/github.com\/lucaslee129<br \/>https:\/\/github.com\/DreamBoy65<br \/>https:\/\/github.com\/0xbear9999<br \/>https:\/\/github.com\/top-web-talent<br \/>https:\/\/github.com\/ProspDev<br \/>https:\/\/github.com\/codemaster05330<br \/>https:\/\/github.com\/sagadev2015<br \/>https:\/\/github.com\/smartman0307<br \/>https:\/\/github.com\/luckyboy125<br \/>https:\/\/github.com\/Devstar1818<br \/>https:\/\/github.com\/supercomet329<br \/>https:\/\/github.com\/golden-hero<br \/>https:\/\/github.com\/ericbrown2716<br \/>https:\/\/github.com\/peterjohnson4987<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/Yoshidayoshi23<br \/>https:\/\/github.com\/coopfeathy<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/EugeneYoona<br \/>https:\/\/github.com\/fairskyDev0201   [Superstar]<br \/>https:\/\/github.com\/bernssolg<br \/>https:\/\/github.com\/erinodev<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/Linda423<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209<br \/>https:\/\/github.com\/genie4viz<br \/>https:\/\/github.com\/chivalrousdev<br \/>https:\/\/github.com\/erinodev<br \/>https:\/\/github.com\/petardev101<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/kevindavies8<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/ericbrown2716<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/coopfeathy<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/EugeneYoona<br \/>https:\/\/github.com\/fairskyDev0201<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/alisenola<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/Linda423<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209 <br \/>https:\/\/github.com\/genie4viz<br \/>https:\/\/github.com\/hussammousa68<br \/>https:\/\/github.com\/zeus-soft-world<br \/>https:\/\/github.com\/erinodev<br \/>https:\/\/github.com\/petardev101<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/kevindavies8<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/ericbrown2716<br \/>https:\/\/github.com\/peterjohnson4987<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/Yoshidayoshi23<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/coopfeathy<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/xbucks<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/EugeneYoona<br \/>https:\/\/github.com\/fairskyDev0201<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/alisenola<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/Linda423<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209  <br \/>https:\/\/github.com\/genie4viz<br \/>https:\/\/github.com\/hussammousa68<br \/>https:\/\/github.com\/zeus-soft-world<br \/>https:\/\/github.com\/chivalrousdev<br \/>https:\/\/github.com\/erinodev<br \/>https:\/\/github.com\/petardev101<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/ericbrown2716<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/xbucks<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/EugeneYoona<br \/>https:\/\/github.com\/fairskyDev0201<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/alisenola<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/Linda423<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209<br \/>https:\/\/github.com\/genie4viz<br \/>https:\/\/github.com\/chivalrousdev<br \/>https:\/\/github.com\/petardev101<br \/>https:\/\/github.com\/supercrytoking<br \/>https:\/\/github.com\/kevindavies8<br \/>https:\/\/github.com\/johnfrench3<br \/>https:\/\/github.com\/renawolford6<br \/>https:\/\/github.com\/Yoshidayoshi23<br \/>https:\/\/github.com\/dreamcoder75<br \/>https:\/\/github.com\/holyblock<br \/>https:\/\/github.com\/AIDevMonster<br \/>https:\/\/github.com\/whiteghostDev<br \/>https:\/\/github.com\/cedev935<br \/>https:\/\/github.com\/aleksandaralek<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/KonohaBrain125<br \/>https:\/\/github.com\/TOP-10-DEV<br \/>https:\/\/github.com\/secretsuperstar1109<br \/>https:\/\/github.com\/champion119<br \/>https:\/\/github.com\/aidev-Jesse<br \/>https:\/\/github.com\/fairskyDev0201<br \/>https:\/\/github.com\/TechSolutionNinja<br \/>https:\/\/github.com\/alisenola<br \/>https:\/\/github.com\/LegendaryDev320<br \/>https:\/\/github.com\/kaleb0402<br \/>https:\/\/github.com\/tosky19941209<br \/>https:\/\/github.com\/touchsky941209<br \/>https:\/\/github.com\/mirdavion<br \/>https:\/\/github.com\/codingzeus1218999<br \/>https:\/\/github.com\/joyfulmagician<br \/>https:\/\/github.com\/sphinxDevVic<br \/>https:\/\/github.com\/SmartDev555<br \/>https:\/\/github.com\/crypto-artisan<br \/>https:\/\/github.com\/Watcher919<br \/>https:\/\/github.com\/operkins<br \/>https:\/\/github.com\/KimBrown<br \/>https:\/\/github.com\/JenniferYoung<br \/>https:\/\/github.com\/christian48<br \/>https:\/\/github.com\/keith16<br \/>https:\/\/github.com\/Clarkwendy<br \/>https:\/\/github.com\/sandovalandrew<br \/>https:\/\/github.com\/coreygonzales<br \/>https:\/\/github.com\/christian48<br \/>https:\/\/github.com\/kwells<br \/>https:\/\/github.com\/Brian35<br \/>https:\/\/github.com\/Gavin50<br \/>https:\/\/github.com\/jay39<br \/>https:\/\/github.com\/christiancampos<br \/>https:\/\/github.com\/JesusMorgan<br \/>https:\/\/github.com\/dnichols<br \/>https:\/\/github.com\/mirandacraig<br \/>https:\/\/github.com\/Kristen36<br \/>https:\/\/github.com\/lmorris<br \/>https:\/\/github.com\/michaelascott<br \/>https:\/\/github.com\/Annette71<br \/>https:\/\/github.com\/bonnie77<br \/>https:\/\/github.com\/Leonard48<br \/>https:\/\/github.com\/elizabethwagner<br \/>https:\/\/github.com\/samanthabailey<br \/>https:\/\/github.com\/Colleen41<br \/>https:\/\/github.com\/brian91<br \/>https:\/\/github.com\/brianroberts<br \/>https:\/\/github.com\/james10<br \/>https:\/\/github.com\/groberts<br \/>https:\/\/github.com\/jordanmorales<br \/>https:\/\/github.com\/jacksonwilliam<br \/>https:\/\/github.com\/anna26<br \/>https:\/\/github.com\/jessicasmall<br \/>https:\/\/github.com\/Tiffany90<br \/>https:\/\/github.com\/gabriel56<br \/>https:\/\/github.com\/NicholasWarner<br \/>https:\/\/github.com\/Christina70<br \/>https:\/\/github.com\/vanessa56<br \/>https:\/\/github.com\/hyang<br \/>https:\/\/github.com\/jordanmorales<br \/>https:\/\/github.com\/jacksonwilliam<br \/>https:\/\/github.com\/anna26<br \/>https:\/\/github.com\/Carl92<br \/>https:\/\/github.com\/randysnyder<br \/>https:\/\/github.com\/thomasparker<br \/>https:\/\/github.com\/ashleykelsey<br \/>https:\/\/github.com\/KaneGregory<br \/>https:\/\/github.com\/SIMONDAVID<br \/>https:\/\/github.com\/lreyes<br \/>https:\/\/github.com\/eric39<br \/>https:\/\/github.com\/vhenry<br \/>https:\/\/github.com\/Mark33<br \/>https:\/\/github.com\/realhardworkingdeveloper<br \/>https:\/\/github.com\/kallis312<\/p>\n<h3>Farmed GitHub accounts:<\/h3>\n<p>e.g Accounts following suspicious profile: https:\/\/github.com\/Sayonara01<\/p>\n<p>https:\/\/github.com\/operkins<br \/>https:\/\/github.com\/KimBrown<br \/>https:\/\/github.com\/JenniferYoung<br \/>https:\/\/github.com\/christian48<br \/>https:\/\/github.com\/keith16<br \/>https:\/\/github.com\/Clarkwendy<br \/>https:\/\/github.com\/sandovalandrew<br \/>https:\/\/github.com\/coreygonzales<br \/>https:\/\/github.com\/christian48<br \/>https:\/\/github.com\/kwells<br \/>https:\/\/github.com\/Brian35<br \/>https:\/\/github.com\/Gavin50<br \/>https:\/\/github.com\/jay39<br \/>https:\/\/github.com\/christiancampos<br \/>https:\/\/github.com\/JesusMorgan<br \/>https:\/\/github.com\/dnichols<br \/>https:\/\/github.com\/mirandacraig<br \/>https:\/\/github.com\/Kristen36<br \/>https:\/\/github.com\/lmorris<br \/>https:\/\/github.com\/michaelascott<br \/>https:\/\/github.com\/Annette71<br \/>https:\/\/github.com\/bonnie77<br \/>https:\/\/github.com\/Leonard48<br \/>https:\/\/github.com\/elizabethwagner<br \/>https:\/\/github.com\/samanthabailey<br \/>https:\/\/github.com\/Colleen41<br \/>https:\/\/github.com\/brian91<br \/>https:\/\/github.com\/brianroberts<br \/>https:\/\/github.com\/james10<br \/>https:\/\/github.com\/groberts<br \/>https:\/\/github.com\/jordanmorales<br \/>https:\/\/github.com\/jacksonwilliam<br \/>https:\/\/github.com\/anna26<br \/>https:\/\/github.com\/jessicasmall<br \/>https:\/\/github.com\/Tiffany90<br \/>https:\/\/github.com\/gabriel56<br \/>https:\/\/github.com\/NicholasWarner<br \/>https:\/\/github.com\/Christina70<br \/>https:\/\/github.com\/vanessa56<br \/>https:\/\/github.com\/hyang<br \/>https:\/\/github.com\/jordanmorales<br \/>https:\/\/github.com\/jacksonwilliam<br \/>https:\/\/github.com\/anna26<br \/>https:\/\/github.com\/Carl92<br \/>https:\/\/github.com\/randysnyder<br \/>https:\/\/github.com\/thomasparker<br \/>https:\/\/github.com\/ashleykelsey<br \/>https:\/\/github.com\/KaneGregory<br \/>https:\/\/github.com\/SIMONDAVID<br \/>https:\/\/github.com\/lreyes<br \/>https:\/\/github.com\/eric39<br \/>https:\/\/github.com\/vhenry<br \/>https:\/\/github.com\/Mark33<\/p>\n<h3>Additional Resources:<\/h3>\n<p><a href=\"https:\/\/medium.com\/coinmonks\/recap-of-findings-regarding-suspicious-lazarus-activity-on-github-cc361074bdc2\">Summary of Findings on Suspicious Lazarus Group Activity on GitHub<\/a><a href=\"https:\/\/medium.com\/coinmonks\/reviewing-the-activity-of-github-accounts-associated-with-lazarus-635cb47881dc\">Reviewing the activity of GitHub accounts associated with Lazarus<\/a><a href=\"https:\/\/medium.com\/coinmonks\/fake-recruiters-in-github-68d0d3bf297d\">Fraud Alert: Fake recruiters on GitHub and LinkedIn<\/a><a href=\"https:\/\/unit42.paloaltonetworks.com\/two-campaigns-by-north-korea-bad-actors-target-job-hunters\/\">Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors<\/a><a href=\"https:\/\/unit42.paloaltonetworks.com\/fake-north-korean-it-worker-activity-cluster\/\">Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack<\/a><a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/pyongyang-your-payroll-rise-north-korean-remote-workers-west#how-to-protect-against-wagemole\">From Pyongyang to Your Payroll: The Rise of North Korean Remote Workers in the West<\/a><a href=\"https:\/\/unit42.paloaltonetworks.com\/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters\/\">Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware<\/a><a href=\"https:\/\/medium.com\/coinmonks\/recap-of-findings-regarding-suspicious-lazarus-activity-on-github-cc361074bdc2\">Summary of Findings on Suspicious Lazarus Group Activity on GitHub<\/a><a href=\"https:\/\/www.ic3.gov\/PSA\/2024\/PSA240903\">North Korea Aggressively Targeting Crypto Industry with Well-Disguised Social Engineering Attacks<\/a><\/p>\n<p><a href=\"https:\/\/medium.com\/coinmonks\/unmasking-suspicious-github-activity-the-wagemole-campaign-and-its-links-to-dprk-threat-actors-248e7901de38\">Unmasking Suspicious GitHub Activity: The Wagemole Campaign and Its Links to DPRK Threat Actors<\/a> was originally published in <a href=\"https:\/\/medium.com\/coinmonks\">Coinmonks<\/a> on Medium, where people are continuing the conversation by highlighting and responding to this story.<\/p>","protected":false},"excerpt":{"rendered":"<p>image: https:\/\/x.com\/cyberwarcon Table of\u00a0Contents Executive Summary Contagious Interview and Wagemole Campaigns \u201cWageMole\u201d Campaign on\u00a0GitHub Suspicious Activity and Behavior in\u00a0GitHub Case: Interaction with Organizations Part 1: \u201cPlease Invite Me to the GitHub Community Organization\u201d Part 2: Interaction of Accounts with GitHub Repositories Part 3: Cluster of Older GitHub\u00a0Accounts Part 4: Suspicious Interactions of These Accounts Across [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-60730","post","type-post","status-publish","format-standard","hentry","category-interesting"],"_links":{"self":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/60730"}],"collection":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=60730"}],"version-history":[{"count":0,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/60730\/revisions"}],"wp:attachment":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=60730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=60730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=60730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}