A new campaign tracked as "Dev Popper" is targeting software developers with fake job interviews in an attempt to trick them into installing a Python remote access trojan (RAT).
Regarding that last one, my last job actually happened because I was made an offer during the first interview before even doing any sort of technical or programming test…
… of course most of the developers there were awful, so I wish they had.
It’s almost as if technical interviews are extremely important in vetting applicants…
Regarding that last one, my last job actually happened because I was made an offer during the first interview
Probably better stated as a red flag not necessarily “they’re not real.” Usually the folks at the company will want at least a little bit of time to think over the interview and discuss.
It’s almost as if technical interviews are extremely important in vetting applicants
It depends, good references and prior work can top “technical interviews” in my book. If someone’s done something interesting a conversation about that interesting thing is often far more useful.
Technical interviews are more important when you’re looking at people fresh out of college or a code bootcamp.
I’ve been offered a job during the interview. But I did think it was super sketchy and didn’t take it.
But honestly it was more of a red flag of them just being desperate than anything dodgy going on. They really weren’t prepared to pay that much money, so they wanted to offer people jobs so they wouldn’t think about it.
Then again, we had the opposite situation with a candidate. Basically, we did our hiring rounds out of order, changed the position they were applying for, and our VP contacted them directly like 3 times after the interviews because we kept seeing weird stuff (had an SO out of state and was considering moving, then wanted to get a masters locally, etc). It worked out and we hired them, and it’s working out so far.
I guess my point is: hiring can be weird. We’ve had candidates skip the second round, repeat rounds, and we even flew one out without even making an offer. Run if the company seems sketchy, but if they’re just kinda weird, consider giving them a shot, some of our best hires had a wired hiring process.
I’ve gotten offered a job on the first interview and I worked there for a while. Then again, that was not in my field of IT and was a part-time job with a well-known company, alongside studies. So while it can be a red flag, it’s not always. Depends on the situation. Just stay vigilant.
That’s a bad take. Unless you get your knowledge purely from shady tutorials or have a fast track bootcamp education, it’s unlikely you never touch on security basics.
I’m a software design undergrad and had to take IT Sec classes. Other profs also touched on how to safely handle dependencies and such.
While IT Security is its own specialisation, blindly trusting source code others provide you with is something a good programmer shouldn’t do.
If you need a metaphor: Just because a woodworker specialises in tables, doesn’t mean they can’t build a chair.
I graduated in CS in this century and we never touched on security. If not for my own curiosity and obligatory annual compliance education on the job (and only on the last one) I would have known near nothing
In my experience, your average software developer has absolutely terrible security hygiene. It’s why you see countless instances of private keys copy/pasted into public GitHub repos or the seemingly daily occurrences of massive data breaches.
My undergrad in CS (which I should point out, is still by far the most common major for software engineers) did not require a security course, and I’m fairly confident that this is pretty typical. To be honest, I wouldn’t have trusted any of my CS professors to know the first thing about security. It’s a completely different field and something that generally requires a lot of practical experience. The closest we ever got was an explanation of asymmetric vs. symmetric encryption. There was certainly no discussion of even basic things like how to properly manage secrets or authn best practices.
Everything I know now as a senior software engineer about software security has come from experience on the job. I’ve been very fortunate to work at some places that take it very seriously (including a government contractor writing cybersecurity software for the Department of Defense) and learned a lot there. But a lot of shops don’t have a culture that promotes good security hygiene, and it shows in the litany of insecure software out in the wild today.
Thanks for the response. Seems like I can’t assume other CS degrees are comparable.
We definitely have a strong focus on security in my degree, but I still believe that awareness of what you’re running on your machine and potential dangers of those programs fall into the category of common sense. Mishandling secrets, having bad authentication or not knowing how to setup SSL is definitely experience stuff though.
It’s sad that this works. You’d think especially software professionals would be the most vigilant about running unknown code.
I run interviews, and a lot of applicants can’t write code. So they’re probably going after low-hanging fruit like that.
Makes sense, I feel bad for the guys that were happy for a chance and got screwed over. (By the hackers, not you, haha)
Some tips for people, real companies won’t:
Be careful out there!
Regarding that last one, my last job actually happened because I was made an offer during the first interview before even doing any sort of technical or programming test…
… of course most of the developers there were awful, so I wish they had.
It’s almost as if technical interviews are extremely important in vetting applicants…
Probably better stated as a red flag not necessarily “they’re not real.” Usually the folks at the company will want at least a little bit of time to think over the interview and discuss.
It depends, good references and prior work can top “technical interviews” in my book. If someone’s done something interesting a conversation about that interesting thing is often far more useful.
Technical interviews are more important when you’re looking at people fresh out of college or a code bootcamp.
I’ve been offered a job during the interview. But I did think it was super sketchy and didn’t take it.
But honestly it was more of a red flag of them just being desperate than anything dodgy going on. They really weren’t prepared to pay that much money, so they wanted to offer people jobs so they wouldn’t think about it.
Yeah, that’s sketchy.
Then again, we had the opposite situation with a candidate. Basically, we did our hiring rounds out of order, changed the position they were applying for, and our VP contacted them directly like 3 times after the interviews because we kept seeing weird stuff (had an SO out of state and was considering moving, then wanted to get a masters locally, etc). It worked out and we hired them, and it’s working out so far.
I guess my point is: hiring can be weird. We’ve had candidates skip the second round, repeat rounds, and we even flew one out without even making an offer. Run if the company seems sketchy, but if they’re just kinda weird, consider giving them a shot, some of our best hires had a wired hiring process.
I’ve gotten offered a job on the first interview and I worked there for a while. Then again, that was not in my field of IT and was a part-time job with a well-known company, alongside studies. So while it can be a red flag, it’s not always. Depends on the situation. Just stay vigilant.
Yup. Sometimes it’ll work out, just look for the big red flags.
A good job won’t expect you to do anything other than show up to interviews and orientation.
Professionals in software development do not mean professionals in cyber security.
Same way you don’t expect a geologist to be a mason
That’s a bad take. Unless you get your knowledge purely from shady tutorials or have a fast track bootcamp education, it’s unlikely you never touch on security basics.
I’m a software design undergrad and had to take IT Sec classes. Other profs also touched on how to safely handle dependencies and such.
While IT Security is its own specialisation, blindly trusting source code others provide you with is something a good programmer shouldn’t do.
If you need a metaphor: Just because a woodworker specialises in tables, doesn’t mean they can’t build a chair.
Edit: Seems like my take is the bad one 😂
I graduated in CS in this century and we never touched on security. If not for my own curiosity and obligatory annual compliance education on the job (and only on the last one) I would have known near nothing
In my experience, your average software developer has absolutely terrible security hygiene. It’s why you see countless instances of private keys copy/pasted into public GitHub repos or the seemingly daily occurrences of massive data breaches.
My undergrad in CS (which I should point out, is still by far the most common major for software engineers) did not require a security course, and I’m fairly confident that this is pretty typical. To be honest, I wouldn’t have trusted any of my CS professors to know the first thing about security. It’s a completely different field and something that generally requires a lot of practical experience. The closest we ever got was an explanation of asymmetric vs. symmetric encryption. There was certainly no discussion of even basic things like how to properly manage secrets or authn best practices.
Everything I know now as a senior software engineer about software security has come from experience on the job. I’ve been very fortunate to work at some places that take it very seriously (including a government contractor writing cybersecurity software for the Department of Defense) and learned a lot there. But a lot of shops don’t have a culture that promotes good security hygiene, and it shows in the litany of insecure software out in the wild today.
Thanks for the response. Seems like I can’t assume other CS degrees are comparable.
We definitely have a strong focus on security in my degree, but I still believe that awareness of what you’re running on your machine and potential dangers of those programs fall into the category of common sense. Mishandling secrets, having bad authentication or not knowing how to setup SSL is definitely experience stuff though.
You are young and blissfully naive. Sec being included with development is a recent thing
Neither young or naive. Just assuming others share my experience.