On October 28, 2025, Kaspersky's GReAT team exposed two new, sophisticated cyber-espionage campaigns, 'GhostCall' and 'GhostHire,' attributed to the North Korean state-sponsored threat actor BlueNoroff (also known as APT38 or Sapphire Sleet). These financially motivated operations target executives and developers in the Web3, cryptocurrency, and venture capital industries. The campaigns demonstrate a significant evolution in the group's tactics, including the use of generative AI for social engineering and malware development, a multi-platform approach targeting both Windows and macOS, and a new suite of custom malware. The ultimate goal is the theft of cryptocurrency and other financial assets.
BlueNoroff, a subgroup of the infamous Lazarus Group, specializes in financially motivated attacks against financial institutions and the cryptocurrency industry. These new campaigns showcase their refined TTPs:
Both campaigns leverage a new malware ecosystem designed for espionage and theft. A key finding is BlueNoroff's use of generative AI to speed up the malware creation process, allowing them to produce more varied and efficient tools. The campaigns have been active since at least April 2025, with victims identified globally.
The attack chain is multi-staged and demonstrates a high level of operational security:
T1566.002 - Phishing: Spearphishing Link): The attack begins with highly personalized outreach on platforms like LinkedIn, targeting specific individuals.T1555.001 - Credentials from Password Stores: Keychain).A successful compromise by BlueNoroff can lead to catastrophic financial losses for both individuals and companies.
D3FEND Technique: Detection requires monitoring for suspicious process chains using
D3-PCA - Process Creation Analysisand analyzing user behavior withD3-UBA - User Behavior Analysis.
D3FEND Countermeasure: A combination of user-focused defenses (
Harden) and technical controls (Detect) is necessary. Key techniques includeD3-ACH - Application Configuration Hardeningand robust user training.
Train high-risk individuals to identify and report sophisticated social engineering attempts, which is the primary vector for these campaigns.
Use application control or allowlisting to prevent the execution of unauthorized software delivered via phishing.
Mapped D3FEND Techniques:
Deploy and maintain EDR and AV solutions on all endpoints, including macOS, to detect and block known malware components.
Mapped D3FEND Techniques:
While not a direct prevention, using hardware wallets for cryptocurrency storage moves private keys offline, making them immune to software-based theft.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats