{"id":45319,"date":"2026-04-11T07:52:54","date_gmt":"2026-04-10T23:52:54","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/11\/graphalgo-scam-lazarus-hackers-register-real-us-llcs-to-spread-malware\/"},"modified":"2026-04-11T07:52:54","modified_gmt":"2026-04-10T23:52:54","slug":"graphalgo-scam-lazarus-hackers-register-real-us-llcs-to-spread-malware","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/11\/graphalgo-scam-lazarus-hackers-register-real-us-llcs-to-spread-malware\/","title":{"rendered":"GraphAlgo Scam: Lazarus Hackers Register Real US LLCs to Spread Malware"},"content":{"rendered":"\n<p>Cybersecurity researchers at ReversingLabs have found a new scam targeting <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/blockchain-in-cybersecurity-opportunities-challenges\/\">blockchain<\/a> developers with fake job offers. Their research, shared with Hackread.com, reveals that hackers are now registering real legal companies in the US to trick their victims.<\/p>\n<h3><strong>The Florida Connection<\/strong><\/h3>\n<p>The hackers, part of the North Korea-linked Lazarus Group, are running what researchers have dubbed the graphalgo campaign, where they have gone to great lengths to create legitimacy. To look like a real business, they registered a company called Blocmerce as a legal LLC in Florida last August, set up accounts that mimic the legitimate firm SWFT Blockchain, and even ran fake operations under the names Blockmerce and Bridgers Finance.<\/p>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs.png\"><img loading=\"lazy\" decoding=\"async\" width=\"910\" height=\"633\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs.png\" style=\"aspect-ratio:1.4376368843713148;width:483px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs.png 910w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-300x209.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-768x534.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-380x264.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-800x556.png 800w\" sizes=\"auto, (max-width: 910px) 100vw, 910px\" alt=\"GraphAlgo Scam: Lazarus Hackers Register Real US LLCs to Spread Malware\" \/><\/a><figcaption> (Credit: ReversingLabs)<\/figcaption><\/figure>\n<\/p><\/div>\n<p>That\u2019s not all. They even filed official state papers listing a fake CEO named Alexandre Miller. Although the addresses in the filings were real locations, ReversingLabs\u2019 investigation revealed that they belonged to innocent residents. &#8220;It is more likely that these are fake (or stolen) identities,&#8221; researchers noted in the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.reversinglabs.com\/blog\/graphalgo-campaign-respawned\">blog post,<\/a> pointing out that it is a tactic <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/about.gitlab.com\/blog\/gitlab-threat-intelligence-reveals-north-korean-tradecraft\/\">frequently <\/a>used by <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/north-korean-hacker-remote-it-job-vpn-slip\/\">North Korean<\/a> state actors.<\/p>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"545\" height=\"567\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-1.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-1.png 545w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-1-288x300.png 288w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/North-Korean-Lazarus-Group-Use-Fake-Florida-LLC-to-Target-Crypto-Devs-1-380x395.png 380w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" alt=\"GraphAlgo Scam: Lazarus Hackers Register Real US LLCs to Spread Malware\" \/><\/a><figcaption>The fake profile (Credit: ReversingLabs)<\/figcaption><\/figure>\n<\/p><\/div>\n<h3><strong>A Recurring Scam<\/strong><\/h3>\n<p>This isn&#8217;t a new scam, though. ReversingLabs first spotted and reported the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.reversinglabs.com\/blog\/fake-recruiter-campaign-crypto-devs\">GraphAlgo campaign<\/a> in February 2026 after finding that it had been active since at least June 2025. Previously, the attack relied on a fake GitHub-based crypto organisation, veltrix-capital, which installed a malicious package called bigmathutils, downloaded 10,000 times on npm.<\/p>\n<p>But this time, researchers noted that the hackers have improved their methods tremendously. Instead of using public stores like <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/suspected-hijacked-developer-accounts-npm-malware\/\">npm<\/a> or <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/psf-warn-fake-pypi-login-site-steal-credentials\/\">PyPI<\/a>, they now hide malware as \u2018release artifacts\u2019 inside <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/north-korean-hackers-github-spy-south-korean-firms\/\">GitHub<\/a>. They even used a trick called git log rewriting to fake the history of their code so that fake employees, Dmytro Buryma and Karina Lesova, look like they had been working on the projects for months. This is basically done to build a false sense of trust.<\/p>\n<p>The group also used <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/malware-infects-linux-macos-typosquatted-go-packages\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/malware-infects-linux-macos-typosquatted-go-packages\/\">typosquatting<\/a> to fool developers. In one case, they created a fake GitHub account that looked exactly like a famous developer Jordan Harband\u2019s account. They swapped the lowercase L at the start of his username, ljharb, with a capital i, which looks like Ijharb. <\/p>\n<p>Developers, thinking they were downloading his tool, side-channel-weakmap, were actually installing malware. The malware is a Remote Access Trojan (<a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/xworm-7-1-remcos-rat-windows-tools-evade-detection\/\" data-type=\"post\" data-id=\"142568\">RAT<\/a>), installed right after a developer runs the \u2018test task.\u2019<\/p>\n<p>\u201cThat payload is the same RAT that we observed in the initial graphalgo campaign&#8230; The structure of the downloader code is pretty much the same as we observed in the earlier campaign, also,\u201d researchers noted.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>This gives the hackers full control over the victim&#8217;s machine and even pings the attackers via Telegram or Slack to let them know the infection worked. It also uses the Sepolia testnet to log the successful attacks.<\/p>\n<p>Since this campaign has remained active throughout late 2025, precaution is your only defence against it. If you are downloading code for a job test, run it in a <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/any-run-sandbox-now-automates-interactive-analysis-of-complex-cyber-attack-chains\/\" data-type=\"post\" data-id=\"122810\">sandbox environment<\/a>, because no matter how popular a project may be, it doesn&#8217;t mean it is safe to trust.<\/p>\n<p>Photo by Rene B\u00f6hmer on <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/unsplash.com\/photos\/silhouette-of-man-standing-inside-structure-6SFfFpHmVjI?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash<\/a><\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"GraphAlgo Scam: Lazarus Hackers Register Real US LLCs to Spread Malware\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers at ReversingLabs have found a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45319","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45319"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45319\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}