·

What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 11/24/25

Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week.

Featured Analysis

Featured article analysis: Fake LinkedIn jobs trick Mac users into downloading Flexible Ferret malware

This article exposes a targeted and multi-stage social engineering campaign, identified as “Contagious Interview,” which is luring Mac users via fake job postings on LinkedIn. The attackers, posing as recruiters, guide victims to a malicious website under the pretense of a job application requiring a video introduction. This initial stage leverages the professional aspirations of job seekers, particularly in technical fields like software development and cryptocurrency, to establish trust. The sophisticated nature of the attack, which researchers suggest points to the Democratic People’s Republic of Korea (DPRK), demonstrates a high level of planning, relying heavily on human vulnerability rather than just technical exploits.

The core of the attack lies in a clever deception aimed at installing a sophisticated piece of malware. When applicants attempt to record a video, the site falsely claims that camera access is blocked and prompts them to download a supposed “update” for the legitimate FFmpeg media processing software. Following this, the victims are instructed to execute a curl command in their Terminal, a technical step that lends false legitimacy and is highly dangerous. This command downloads a script that installs a Go-based backdoor. Crucially, a subsequent decoy application, disguised as a Chrome prompt, is used to trick the user into entering their system password, which is immediately stolen and sent to the attackers via Dropbox.

The ultimate payload is the Flexible Ferret malware, a multi-stage macOS threat active since early 2025. Once installed, it establishes persistence by creating a LaunchAgent, ensuring it survives system restarts and grants attackers long-term, covert access. This backdoor is highly invasive, giving the cybercriminals capabilities to collect detailed system information, upload and download files, execute shell commands (granting full system control), and specifically target and extract data from Chrome browser profiles. The campaign highlights the increasing trend of sophisticated, persistent malware targeting macOS and serves as a critical warning about the need for extreme caution when dealing with unsolicited communications and instructions to run code, even if delivered through professional platforms.

Projects

Articles