North Korean hacker BlueNoroff targets crypto firms with new malware
2024-11-12 09:32:47 Primitive Reading

 

From cointelegraph by Vince Quill

NEWSCOINTELEGRAPH IN YOUR SOCIAL FEEDFollow ourSubscribe on

BlueNoroff, the notorious North Korean hacking group behind a series of phishing and cybersecurity attacks since 2019, is now targeting cryptocurrency firms with a new malware designed specifically to infiltrate Apple’s macOS.

According to a report from SentinelLabs, the malware operation nicknamed “Hidden Risk” is spread through PDF files in multiple stages. The threat actors use fake news headlines and legitimate crypto market research to lure in unsuspecting individuals and companies.

Once the user downloads the PDF file, a seemingly legitimate decoy PDF is downloaded and opened, while the malware downloads as a separate file on the macOS desktop in the background.

This malware package contains a number of functions designed to give the hackers a backdoor to remotely access a victim’s computer to steal sensitive information, including private keys for digital asset wallets and platforms.

A map of the BlueNoroff exploit. Source: SentinelLabs

Related: Lazarus Group exploited Chrome vulnerability with fake NFT game

FBI issues warning about North Korean hackers

The United States Federal Bureau of Investigation (FBI) has issued several warnings about BlueNoroff, the broader Lazarus hacking group, and other malicious actors with ties to the North Korean regime over the past several years.

In April 2022, the law enforcement agency and the Cybersecurity and Infrastructure Security Agency (CISA) sounded the alarm and advised crypto firms to take precautionary steps to mitigate the risks posed by the state-sanctioned hacking groups.

Following the warning, BlueNoroff initiated another phishing campaign in December 2022 targeting companies and banks. The threat actors created more than 70 fraudulent domain names designed to disguise the hackers as legitimate venture capital firms to gain access to the target victim’s computers and steal funds.

Disclaimer: This specification is preliminary and is subject to change at any time without notice. Amazon Finance assumes no responsibility for any errors contained herein.

Recommended reading
Dune acquires a16z-backed smlXL to expand real-time blockchain data offering

10-22     admin     15058 Reading

Stacks founder Muneeb Ali eyes early December for sBTC upgrade launch

10-22     admin     17385 Reading

SEC mulls approving Ethereum ETF options

10-22     admin     7049 Reading

ENS Labs introduces own ‘L2-agnostic’ rollup Namechain, aiming for launch by end of 2025

10-22     admin     14761 Reading

What happened to the top 10 cryptos from when Trump was last president?

10-22     admin     19468 Reading

Bitcoin price will hit $1M, but at what cost? — Michaël van de Poppe

10-22     admin     6916 Reading

NEAR partnership, Surge Campaign, LiaBTC and Nakamoto Release

10-22     admin     12149 Reading

Cronos Labs Strengthens Google Cloud Partnership to Accelerate Cronos Ecosystem Growth

10-22     admin     15074 Reading

Jack Dorsey's Block to prioritize bitcoin mining and wind down decentralized tech arm TBD

10-22     admin     19068 Reading

'Not your keys, not your blockchain': DEGEN L3 can't switch 'rollup-as-a-service' providers from firm holding its keys

10-22     admin     7661 Reading

BlackRock's IBIT sees record $4 billion trading volume following US elections, CZ received offers for Binance stake and more

10-22     admin     8503 Reading

Dutch Court Orders Binance to Disclose User Identity in €186,000 Fraud Case

10-22     admin     8477 Reading

PayPal-backed Magic Labs and Polygon launch a new cross-chain network aiming to bust 'blockchain silos'

10-22     admin     17058 Reading

Crypto-AI startup Pond raises $7.5 million in seed funding

10-22     admin     13548 Reading

Just four entities account for nearly all the votes to keep MakerDAO's rebranding to Sky

10-22     admin     14041 Reading