Lazarus’ latest tactics: Deceptive development and ClickFix




While conducting routine clipboard monitoring, our team uncovered a sophisticated attack chain masquerading as an official NVIDIA-related update. What initially appeared to be a hiring assessment challenge quickly revealed itself to be a cleverly disguised lure.
The deceptive journey
The attack begins with a prompt to complete a mock interview form, followed by a page instructing users to set up their camera. This page falsely claims there are issues with the user's webcam or microphone, adding a layer of urgency and credibility to the ruse.



A pop-up then urges users to “Request camera access,” which triggers a seemingly legitimate update command using an NVIDIA domain, to help the user fix his issues.

However, once copied, the command morphs into a malicious payload.

The attack chain
Executing the command initiates a multi-stage attack:
- A malicious archive is downloaded and automatically extracted.
- The VBS script launches a Python environment embedded within the archive, posing as a legitimate driver update process. It displays verbose output to further trick the user.
- The Python script itself is heavily obfuscated and aligns with known tactics used by the Lazarus APT group.

Upon deobfuscation, the script reveals five major functionalities:
- Credential Theft: WebBrowserPassView is downloaded, decrypted and executed to extract browser-related credentials. Those credentials, together with system information, are exfiltrated to the command-and-control (C2) server.
- Credential Theft: MailPassView is downloaded, decrypted and run to harvest email credentials, which are also sent to the C2.
- Remote Access: An instance of MeshAgent is silently installed, providing the attackers with persistent remote control over the infected system.
- Advanced Data Theft and Remote Access: A PyInstaller EXE enables file and secret extraction via FTP. Persistence is achieved through a scheduled task disguised as ChromeUpdate.exe, placed within the legitimate Chrome directory to avoid suspicion.
- Cryptocurrency Targeting: Browser extensions and local folders related to cryptocurrencies are harvested and sent to the C2.
Attribution and implications
The attack’s complexity and methodology, paired with the initial lure and code similarities throughout the Python scripts, strongly suggest Lazarus’ involvement. This campaign reflects the group’s evolving tactics under the DeceptiveDevelopment umbrella, combining psychological manipulation with technical sophistication to bypass defenses and exploit trust.
Indicators of Compromise (IoCs)
Assessment URL: hxxps[://]assessdome[.]com/invite/7e462f3c/8002565804
C2: metakenproxy[.]com:81
Initial VBS script (SHA256): 7013822c0a794712c5fe8f62c126e5992dca4a744882a039040569ae4ec1a868
Initial Python script (SHA256): 03ad194456951695eb4d4ceb40d9e52aaadbc9a4f4b8b1d020077115103e5359
WebBrowserPassView (SHA256): 36541fad68e79cdedb965b1afcdc45385646611aa72903ddbe9d4d064d7bffb9
MailPassView (SHA256): bc7bd27e94e24a301edb3d3e7fad982225ac59430fc476bda4e1459faa1c1647
MeshAgent (SHA256): 9757780860ec5637c412a8756f25c56f7d1d89358e447782164ba418def1c64e
ChromeUpdate.exe (SHA256): 00bef70cd031a830f2ee1ec4ce750947a9c8838995289ecbb253426cca53d046
