North Korean Hackers Target Windows and macOS Users with PylangGhost RAT

The North Korean-aligned Famous Chollima group has intensified its cyber operations by deploying a sophisticated new Python-based remote access trojan (RAT) targeting Windows and macOS users in the cryptocurrency and blockchain sectors. This malware campaign marks a significant evolution of their previously documented GolangGhost RAT, showcasing the group’s technical sophistication and adaptability in pursuing financial gain through elaborate social engineering schemes.
The attack primarily targets software engineers, marketing professionals, designers, and others experienced in cryptocurrency and blockchain technologies through a deceptive fake job recruitment process.


The threat actors create convincing fake employer websites impersonating legitimate companies like Coinbase, Archblock, Robinhood, Parallel Studios, and Uniswap to lure unsuspecting victims.
Cisco Talos researchers identified this new variant, dubbed “PylangGhost,” in May 2025. They noted its functional similarity to the GolangGhost RAT while maintaining distinct capabilities across different operating systems. The group strategically deploys the Python-based version for Windows users while continuing to use the Golang-based version for macOS, with Linux systems currently excluded from targeting.
The infection process begins with victims receiving invite codes to access skill-testing websites built using the React framework. After completing questionnaires and providing personal details, victims are prompted to enable camera access for video recording. The malicious sites then instruct users to install fake video drivers, with tailored commands for their operating systems.


Windows users receive PowerShell or Command Shell instructions, while macOS users get Bash commands. This process downloads a ZIP file containing PylangGhost modules and a Visual Basic Script that extracts the Python library and launches the trojan through a renamed Python interpreter executing “nvidia.py.”
This multi-stage approach disguises the malware deployment as legitimate software installation, exploiting users’ trust. The PylangGhost architecture consists of six structured Python modules, with the main execution starting through “nvidia.py,” which establishes system persistence and initiates command-and-control communications. The malware can steal credentials and session cookies from over 80 browser extensions, including popular cryptocurrency wallets like Metamask and 1Password, directly supporting the group’s financial objectives.
- Other (43)
- Ransomware (153)
- Events and News (27)
- Features (45)
- Security (483)
- Tips (79)
- Google (27)
- Achievements (11)
- Products (35)
- Activation (7)
- Dealers (1)
- Bank Phishing (48)
- Malware Alerts (224)
- Cyber Attack (283)
- Data Backup (13)
- Data Breach (114)
- Phishing (162)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (69)
- Android Security (72)
- Knoweldgebase (38)
- Botnet (16)
- Updates (4)
- Alert (71)
- Hacking (62)
- Social Media (8)
- vulnerability (66)
- Hacker (35)
- Spyware (11)
- Windows (7)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (3)
- Website hacks (7)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (8)
- Mozilla (2)
- COVID-19 (5)
- Instagram (3)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (25)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (14)