![]() In this case, an employee of an unidentified global bank unsuspectingly installed the malware on a company computer after downloading a third-party cryptocurrency trading application recommended over email, researchers said. US-CERT and other security watchdogs have noted recent re-appearances of the malware. The attack also saw Lazarus falling back–pun intended–on an old malware tool called Fallchill, which the group previously used and “recently switched back to,” according to the post. It’s probably the first time we see this APT group using malware for macOS.” “A version for Linux is apparently coming soon, according to the website. ![]() “To ensure that the OS platform was not an obstacle to infecting targets, it seems the attackers went the extra mile and developed malware for other platforms, including for macOS,” according to the post. ![]() However, the attack–which researchers dubbed “AppleJeus”–also was unique in that it used malware developed for MacOS, the first time researchers have identified the hacker group doing so, according to a post on the Kaspersky blog. Kaspersky researchers made what they call the “unexpected discovery” while assisting with incident-response efforts to an attack on a cryptocurrency exchange, a type of attack for which threat actor Lazarus has become known. North Korean state-sponsored hacking group Lazarus is believed to be behind a recent crypto jacking attack on several banks with an unexpected twist–the use of a Trojan that tricked a company employee into downloading malware, according to Kaspersky Lab.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |