PODCAST · technology
The Fake Interview
by Red Asgard
The Fake Interview is a narrative security investigation about how a fake coding interview became a global credential-theft operation.Across the series, valh4x and Red Asgard Security Research trace a DPRK-linked, Lazarus-attributed campaign from malicious developer repositories to exposed command-and-control infrastructure, blockchain dead drops, malware payloads, operator mistakes, victim data, and the uncomfortable question every threat hunter eventually faces: who is watching whom?This show is built for security researchers, developers, threat intelligence teams, Web3 engineers, and anyone who wants to understand how modern social-engineering operations actually work.Topics include fake recruiter personas, malicious coding tests, developer compromise, C2 infrastructure, malware analysis, credential theft, blockchain abuse, OPSEC failures, and the defender lessons learned from following the evidence.Attribution is handled carefully
-
3
Trailer: The Fake Interview
A fake coding interview. A malicious repository. A real developer workstation.The Fake Interview is a Red Asgard narrative investigation into a DPRK-linked, Lazarus-attributed campaign targeting developers, Web3 engineers, and freelance technologists through job offers, coding tests, and trust.Start with Episode 1: Real Blood on the Wire.
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
The Fake Interview is a narrative security investigation about how a fake coding interview became a global credential-theft operation.Across the series, valh4x and Red Asgard Security Research trace a DPRK-linked, Lazarus-attributed campaign from malicious developer repositories to exposed command-and-control infrastructure, blockchain dead drops, malware payloads, operator mistakes, victim data, and the uncomfortable question every threat hunter eventually faces: who is watching whom?This show is built for security researchers, developers, threat intelligence teams, Web3 engineers, and anyone who wants to understand how modern social-engineering operations actually work.Topics include fake recruiter personas, malicious coding tests, developer compromise, C2 infrastructure, malware analysis, credential theft, blockchain abuse, OPSEC failures, and the defender lessons learned from following the evidence.Attribution is handled carefully
HOSTED BY
Red Asgard
CATEGORIES
Loading similar podcasts...