The Fake Interview

PODCAST · technology

The Fake Interview

The Fake Interview is a narrative security investigation about how a fake coding interview became a global credential-theft operation.Across the series, valh4x and Red Asgard Security Research trace a DPRK-linked, Lazarus-attributed campaign from malicious developer repositories to exposed command-and-control infrastructure, blockchain dead drops, malware payloads, operator mistakes, victim data, and the uncomfortable question every threat hunter eventually faces: who is watching whom?This show is built for security researchers, developers, threat intelligence teams, Web3 engineers, and anyone who wants to understand how modern social-engineering operations actually work.Topics include fake recruiter personas, malicious coding tests, developer compromise, C2 infrastructure, malware analysis, credential theft, blockchain abuse, OPSEC failures, and the defender lessons learned from following the evidence.Attribution is handled carefully

  1. 3

    Trailer: The Fake Interview

    A fake coding interview. A malicious repository. A real developer workstation.The Fake Interview is a Red Asgard narrative investigation into a DPRK-linked, Lazarus-attributed campaign targeting developers, Web3 engineers, and freelance technologists through job offers, coding tests, and trust.Start with Episode 1: Real Blood on the Wire.

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

The Fake Interview is a narrative security investigation about how a fake coding interview became a global credential-theft operation.Across the series, valh4x and Red Asgard Security Research trace a DPRK-linked, Lazarus-attributed campaign from malicious developer repositories to exposed command-and-control infrastructure, blockchain dead drops, malware payloads, operator mistakes, victim data, and the uncomfortable question every threat hunter eventually faces: who is watching whom?This show is built for security researchers, developers, threat intelligence teams, Web3 engineers, and anyone who wants to understand how modern social-engineering operations actually work.Topics include fake recruiter personas, malicious coding tests, developer compromise, C2 infrastructure, malware analysis, credential theft, blockchain abuse, OPSEC failures, and the defender lessons learned from following the evidence.Attribution is handled carefully

HOSTED BY

Red Asgard

CATEGORIES

URL copied to clipboard!