• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
north korean hackers spread applejeus malware disguised as cryptocurrency apps

North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps

You are here: Home / General Cyber Security News / North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps
December 5, 2022

The Lazarus Group threat actor has been observed leveraging pretend cryptocurrency apps as a entice to provide a formerly undocumented model of the AppleJeus malware, in accordance to new results from Volexity.

“This action notably involves a marketing campaign probable concentrating on cryptocurrency people and businesses with a variant of the AppleJeus malware by way of destructive Microsoft Office environment paperwork,” researchers Callum Roxan, Paul Rascagneres, and Robert Jan Mora mentioned.

The North Korean authorities is identified to adopt a 3-pronged technique by utilizing destructive cyber activity developed to gather intelligence, conduct attacks, and create illicit income for the sanctions strike nation. The threats are collectively tracked beneath the identify Lazarus Group (aka Concealed Cobra or Zinc).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

“North Korea has done cyber theft from money establishments and cryptocurrency exchanges worldwide, potentially stealing hundreds of tens of millions of pounds, almost certainly to fund government priorities, such as its nuclear and missile plans,” per the 2021 Yearly Danger Evaluation introduced by U.S. intelligence organizations.

Earlier this April, the Cybersecurity and Infrastructure Security Company (CISA) warned of an exercise cluster dubbed TraderTraitor that targets cryptocurrency exchanges and trading companies as a result of trojanized crypto apps for Windows and macOS.

AppleJeus Malware

Whilst the TraderTraitor attacks culminate in the deployment of the Manuscrypt distant access trojan, the new action helps make use of a meant crypto investing site named BloxHolder, a copycat of the respectable HaasOnline system, to provide AppleJeus through an installer file.

AppleJeus, 1st documented by Kaspersky in 2018, is intended to harvest information about the contaminated system (i.e., MAC tackle, laptop or computer title, and working method version) and obtain shellcode from a command-and-control (C2) server.

The attack chain is claimed to have undergone a slight deviation in Oct 2022, with the adversary shifting from MSI installer documents to a booby-trapped Microsoft Excel doc that takes advantage of macros to down load a remotely hosted payload, a PNG graphic, from OpenDrive.

The plan behind the change is probably to lessen static detection by security items, Volexy stated, introducing it could not attain the impression file (“Qualifications.png”) from the OpenDrive website link but pointed out it embeds a few information, which includes an encoded payload that’s subsequently extracted and introduced on the compromised host.

“The Lazarus Team proceeds its energy to concentrate on cryptocurrency users, even with ongoing interest to their strategies and strategies,” the scientists concluded.

Identified this article intriguing? Comply with us on Twitter  and LinkedIn to study a lot more exceptional material we write-up.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Microsoft: Beware Russian Winter Cyber-Offensive
Next Post: Digital Giant ABB to Pay $315m in Bribery Case Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.