According to BlockBeats, on January 16th, SlowMist CISO 23pds disclosed in a post on X that "North Korean hackers launched a cyber attack called 'Operation 99' on Web3 and cryptocurrency software developers. The operation started with fake recruiters, conducted on platforms such as LinkedIn, using project testing and code reviews to lure developers. Once the victim is hooked, they will be guided to clone a malicious GitLab repository, seemingly harmless but filled with disaster. Cloning code connects to the Command and Control (C2) server, embedding malicious software into the victim's environment to control the victim's computer