Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean hackers have updated the BeaverTail malware to target MacOS users
Global Security

North Korean hackers have updated the BeaverTail malware to target MacOS users

AdminBy AdminJuly 17, 2024No Comments4 Mins Read
BeaverTail macOS Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 17, 2024Information hallCyber ​​Espionage / Cryptocurrency

BeaverTail malware for macOS

Cyber ​​security researchers have revealed an updated variant of the notorious hijacker malware that attackers linked to the Democratic People’s Republic of Korea (DPRK) delivered as part of previous cyber-espionage campaigns targeting job seekers.

The artifact in question is an Apple macOS disk image (DMG) file named “MiroTalk.dmg” that simulates legal video calling service with the same name but actually serves as a delivery channel for a native version of BeaverTail, security researcher Patrick Wardle said.

BeaverTail refers to JavaScript hijacking malware that was first documented by Palo Alto Networks’ Unit 42 in November 2023 as part of a campaign called Contagious interview which aims to infect software developers with malware through an alleged chat process. Securonix tracks the same activity under an alias DEV#POPER.

In addition to extracting sensitive information from web browsers and crypto wallets, the malware is capable of delivering additional payloads such as InvisibleFerret, a Python backdoor responsible for loading AnyDesk for persistent remote access.

Cyber ​​security

While BeaverTail was spreading through fake npm packages hosted on GitHub and the npm package registry, the latest findings mark a shift in the distribution vector.

“If I had to guess, the North Korean hackers most likely approached their potential victims by asking them to join a recruitment meeting by downloading and running (an infected version of) MiroTalk hosted on mirotalk(.)net,” Wardle said.

Analysis of the unsigned DMG file shows that it facilitates the theft of data from web browsers such as Google Chrome, Brave and Opera, cryptocurrency wallets and iCloud Keychain. In addition, it is designed to download and execute additional Python scripts from a remote server (such as InvisibleFerret).

“North Korean hackers are a crafty bunch, and they’re quite adept at hacking macOS targets, even if their technique often relies on social engineering (and thus isn’t very impressive from a technical standpoint),” Wardle said.

Disclosure occurs as Phylum uncovered a new malicious npm package called call-blockflow, which is virtually identical to the legitimate call-bind, but includes sophisticated functionality to download a remote binary while making a painstaking effort to fly under the radar.

“In this attack, although the call-bind package was not compromised, the weaponized call-blockflow package copies all the trust and legitimacy of the original to support the success of the attack,” according to a statement shared with The Hacker News.

The package, suspected to be from the North Korea-linked Lazarus Group and not published until about an hour and a half after it was uploaded to npm, attracted a total of 18 downloads. The evidence suggests that activitycontaining more than three dozen malicious packages, has been in waves since September 2023.

“Once installed, these packages downloaded a remote file, decrypted it, executed the exported function on it, and then carefully covered their tracks by deleting and renaming the files,” the software security firm said. said. “This left the package directory in a seemingly benign state after installation.”

It also follows a JPCERT/CC message warning of cyberattacks by North Korean Kimsuki actor focused on Japanese organizations.

The infection process begins with phishing messages that impersonate security services and diplomatic organizations and contain a malicious executable that, when opened, causes a Visual Basic Script (VBS) to be loaded, which in turn extracts a PowerShell script to harvest the user account, system and network information, and list files and processes.

The collected information is then passed to the control server (C2), which responds with a second VBS file, which is then executed to retrieve and run a PowerShell-based keylogger called InfoKey.

“Although there have been several reports of Kimsuky attacks on organizations in Japan, there is a possibility that Japan is also being targeted,” JPCERT/CC. said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.