North Korean hackers use new macOS malware against crypto firms

North Korean hackers use new macOS malware against crypto firms

November 7, 2024 at 05:17PM

North Korean hacker group BlueNoroff is targeting crypto businesses with a new multi-stage macOS malware campaign, dubbed “Hidden Risk.” Utilizing phishing emails about cryptocurrency, the malware employs novel techniques for persistence and evasion, ensuring it remains undetected. This campaign marks an evolution in their tactics over the past year.

### Meeting Takeaways

1. **Threat Overview**:
– North Korean threat actor BlueNoroff is targeting crypto-related businesses using a new multi-stage macOS malware campaign named “Hidden Risk”.

2. **Phishing Tactics**:
– Attackers send phishing emails disguised as credible communications from cryptocurrency influencers. These emails include links to fake PDFs hosted on the attackers’ domain, appearing legitimate.

3. **Malware Deployment**:
– The initial malware is a dropper app, disguised as a legitimate application, which downloads and executes the next payload while distracting the victim with a decoy PDF.

4. **Technical Details**:
– The dropper app is signed with a valid Apple Developer ID, which has since been revoked by Apple.
– The malware employs a modified `.zshenv` file and creates hidden markers in the system for persistence, operating undetected by recent macOS security measures.

5. **Persistence Mechanism**:
– The campaign utilizes a unique persistence method that modifies user configurations to ensure the malware remains active across restarts and user sessions, bypassing detection systems.

6. **Backdoor Functionality**:
– Once installed, the backdoor connects to a command-and-control (C2) server every 60 seconds, awaiting further instructions, which could include downloading more malware or exfiltration of files.

7. **Duration and Behavior**:
– The “Hidden Risk” campaign has been active for approximately 12 months, utilizing different strategies compared to previous BlueNoroff phishing tactics.

8. **Security Implications**:
– The threat actor’s ability to create new Apple developer accounts and notarize malicious payloads poses significant risks to macOS users within the crypto sector.

9. **Future Considerations**:
– Continuous monitoring and heightened awareness of phishing tactics and malware behavior are essential for organizations operating in the cryptocurrency space to mitigate risks associated with such threats.

### Action Items:
– Increase cybersecurity training for employees to recognize phishing attempts.
– Implement stronger security measures for macOS systems, including enhanced monitoring for unauthorized behavior.
– Review and strengthen policies regarding the use of software signed by unknown or newly created developer accounts.

Full Article