Forsidebilde av showet The Fake Interview

The Fake Interview

Podkast av Red Asgard

engelsk

Teknologi og vitenskap

Tidsbegrenset tilbud

2 Måneder for 19 kr

Deretter 99 kr / MånedAvslutt når som helst.

  • 20 timer lydbøker i måneden
  • Eksklusive podkaster
  • Gratis podkaster
Kom i gang

Les mer The Fake Interview

The Fake Interview is a narrative security investigation about how a fake coding interview became a global credential-theft operation. Across the series, valh4x and Red Asgard Security Research trace a DPRK-linked, Lazarus-attributed campaign from malicious developer repositories to exposed command-and-control infrastructure, blockchain dead drops, malware payloads, operator mistakes, victim data, and the uncomfortable question every threat hunter eventually faces: who is watching whom? This show is built for security researchers, developers, threat intelligence teams, Web3 engineers, and anyone who wants to understand how modern social-engineering operations actually work. Topics include fake recruiter personas, malicious coding tests, developer compromise, C2 infrastructure, malware analysis, credential theft, blockchain abuse, OPSEC failures, and the defender lessons learned from following the evidence. Attribution is handled carefully. The show distinguishes between confirmed technical evidence, high-confidence assessment, and unresolved questions.

Alle episoder

5 Episoder

episode The Repository That Called Home: Lazarus, Fake Interviews, and Malicious Code cover

The Repository That Called Home: Lazarus, Fake Interviews, and Malicious Code

Episode 2 of The Fake Interview follows the first repository: a fake software project delivered through a job interview that behaved like real work until the moment it called home. We examine how a malicious coding test abused normal developer behavior: opening a project, trusting a workspace, installing dependencies, running local code, and debugging what looked like a broken app. This episode covers: - DPRK-linked fake interview activity - malicious GitHub / contractor repositories - VSCode and Cursor workspace trust abuse - run-on-folder-open execution - Function.constructor abuse in JavaScript - Vercel-hosted stage-one infrastructure - payload delivery and command-and-control routing - why developer machines are high-value targets Companion notes: https://podcast.redasgard.com/pages/companion-technical-notes-episode-02-the-repository-that-called-home

6. mai 2026 - 24 min
Registrer deg for å lytte
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Liker at det er både Podcaster (godt utvalg) og lydbøker i samme app, pluss at man kan holde Podcaster og lydbøker atskilt i biblioteket.
Bra app. Oversiktlig og ryddig. MYE bra innhold⭐️⭐️⭐️

Velg abonnementet ditt

Mest populær

Tidsbegrenset tilbud

Premium

20 timer lydbøker

  • Eksklusive podkaster

  • Ingen annonser i Podimo shows

  • Avslutt når som helst

2 Måneder for 19 kr
Deretter 99 kr / Måned

Kom i gang

Premium Plus

100 timer lydbøker

  • Eksklusive podkaster

  • Ingen annonser i Podimo shows

  • Avslutt når som helst

Prøv gratis i 14 dager
Deretter 169 kr / måned

Prøv gratis

Bare på Podimo

Populære lydbøker

Kom i gang

2 Måneder for 19 kr. Deretter 99 kr / Måned. Avslutt når som helst.