Currencies33181
Market Cap$ 3.09T-0.73%
24h Spot Volume$ 27.52B+6.68%
DominanceBTC61.33%-0.05%ETH7.14%+0.77%
ETH Gas0.96 Gwei
Cryptorank
MainNewsJamf Spots N...

Jamf Spots New MacOS Crypto Malware Attributed to North Korea’s Lazarus BlueNoroff Group


by Cryptonews
Source: Pixabay

BlueNoroff, the notorious hackers’ group with links to North Korea’s Lazarus, has debuted a fresh MacOS malware targeting financial institutions.

Uncovered by researchers from the Apple device management firm – Jamf, the perpetrators have been hiding behind a legitimate-looking cryptocurrency exchange.

According to a detailed report by Jamf published Tuesday, the malicious payload communicates with swissborg[.]blog domain, controlled by the attackers. The actors registered the domain on May 31 and hosted at an IP address, part of BlueNoroff infrastructure.

“The malware splits the command and control (C2) URL into two separate strings that get concatenated together. This is likely an attempt to evade static-based detection,” the report explains.

The news comes days after the infamous Lazarus Group used a new malware dubbed “Kandykorn” to target a crypto exchange. The group apparently deployed the advanced Kandykorn malware through a complex 5-stage process, featuring reflective loading.

BlueNoroff is a threat actor that specifically targets cryptocurrencies and crypto startups, and financial entities such as banks.

Similarities to RustBucket Campaign

Jamf Threat Labs noted that the new malware, discovered at a later-stage, shares similar characteristics with BlueNoroff’s RustBucket campaign.

Identified in April this year, the campaign works to compromise macOS devices. Actors reach targets directly claiming to be an investor or head hunter, offering beneficial partnerships.

BlueNoroff also created a domain for the RustBucket campaign, that looks like it belongs to a legitimate crypto company. The aim was to blend with network activity to evade detection.

The Jamf team used the same method to detect the new malware. The new MacOS crypto-malware has links to several URLs from one domain, used for its communication, Jamf noted.

“The malware is written in Objective-C and operates as a very simple remote shell that executes shell commands sent from the attacker server.”

The perpetrators likely use the malware at a later stage to manually run commands after compromising a system, experts wrote. However, the researchers cleared that this malware at a glance is “very different” from the previously mentioned RustBucket malware.

“But the attacker’s focus in both cases seems to be providing simple remote shell capability,” they added.

Though the malware looks fairly simple it is “still very functional,” helping attackers carry out their objectives, the report said. The Jamf team names the new detection as “ObjCShellz,” considering it as a part of the RustBucket campaign.

“Based on previous attacks performed by BlueNoroff, we suspect that this malware was a late stage within a multi-stage malware delivered via social engineering.”

The post Jamf Spots New MacOS Crypto Malware Attributed to North Korea’s Lazarus BlueNoroff Group appeared first on Cryptonews.

Read the article at Cryptonews

Read More

Coinbase Quietly Holds 2.7  Million Bitcoin Under Management, Worth About $261  Billion

Coinbase Quietly Holds 2.7  Million Bitcoin Under Management, Worth About $261  Billion

Coinbase quietly guards a digital war chest of 2.7 million bitcoin, with Wall Street ...
Updated List of the 20 Richest Bitcoin Owners Published – Surprising Names Included, Here Are Their Total Assets

Updated List of the 20 Richest Bitcoin Owners Published – Surprising Names Included, Here Are Their Total Assets

An updated estimated list of the largest holders of the world's largest cryptocurrenc...
MainNewsJamf Spots N...

Jamf Spots New MacOS Crypto Malware Attributed to North Korea’s Lazarus BlueNoroff Group


by Cryptonews
Source: Pixabay

BlueNoroff, the notorious hackers’ group with links to North Korea’s Lazarus, has debuted a fresh MacOS malware targeting financial institutions.

Uncovered by researchers from the Apple device management firm – Jamf, the perpetrators have been hiding behind a legitimate-looking cryptocurrency exchange.

According to a detailed report by Jamf published Tuesday, the malicious payload communicates with swissborg[.]blog domain, controlled by the attackers. The actors registered the domain on May 31 and hosted at an IP address, part of BlueNoroff infrastructure.

“The malware splits the command and control (C2) URL into two separate strings that get concatenated together. This is likely an attempt to evade static-based detection,” the report explains.

The news comes days after the infamous Lazarus Group used a new malware dubbed “Kandykorn” to target a crypto exchange. The group apparently deployed the advanced Kandykorn malware through a complex 5-stage process, featuring reflective loading.

BlueNoroff is a threat actor that specifically targets cryptocurrencies and crypto startups, and financial entities such as banks.

Similarities to RustBucket Campaign

Jamf Threat Labs noted that the new malware, discovered at a later-stage, shares similar characteristics with BlueNoroff’s RustBucket campaign.

Identified in April this year, the campaign works to compromise macOS devices. Actors reach targets directly claiming to be an investor or head hunter, offering beneficial partnerships.

BlueNoroff also created a domain for the RustBucket campaign, that looks like it belongs to a legitimate crypto company. The aim was to blend with network activity to evade detection.

The Jamf team used the same method to detect the new malware. The new MacOS crypto-malware has links to several URLs from one domain, used for its communication, Jamf noted.

“The malware is written in Objective-C and operates as a very simple remote shell that executes shell commands sent from the attacker server.”

The perpetrators likely use the malware at a later stage to manually run commands after compromising a system, experts wrote. However, the researchers cleared that this malware at a glance is “very different” from the previously mentioned RustBucket malware.

“But the attacker’s focus in both cases seems to be providing simple remote shell capability,” they added.

Though the malware looks fairly simple it is “still very functional,” helping attackers carry out their objectives, the report said. The Jamf team names the new detection as “ObjCShellz,” considering it as a part of the RustBucket campaign.

“Based on previous attacks performed by BlueNoroff, we suspect that this malware was a late stage within a multi-stage malware delivered via social engineering.”

The post Jamf Spots New MacOS Crypto Malware Attributed to North Korea’s Lazarus BlueNoroff Group appeared first on Cryptonews.

Read the article at Cryptonews

Read More

Coinbase Quietly Holds 2.7  Million Bitcoin Under Management, Worth About $261  Billion

Coinbase Quietly Holds 2.7  Million Bitcoin Under Management, Worth About $261  Billion

Coinbase quietly guards a digital war chest of 2.7 million bitcoin, with Wall Street ...
Updated List of the 20 Richest Bitcoin Owners Published – Surprising Names Included, Here Are Their Total Assets

Updated List of the 20 Richest Bitcoin Owners Published – Surprising Names Included, Here Are Their Total Assets

An updated estimated list of the largest holders of the world's largest cryptocurrenc...