Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google ordered to pay 314 million for abuse of cellular Android users without permission

July 4, 2025

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Malware linked to North Korea targets Windows, Linux and macOS developers
Global Security

Malware linked to North Korea targets Windows, Linux and macOS developers

AdminBy AdminJuly 31, 2024No Comments3 Mins Read
Windows, Linux, and macOS
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 31, 2024Ravi LakshmananDevelopment of malware / programs

Windows, Linux and macOS

The threat actors behind the current malware campaign targeting software developers have demonstrated new malware and tactics as they expand their focus to Windows, Linux and macOS systems.

Activity cluster, dubbing DEV#POPER and linked to North Korea, has been found to have singled out victims in South Korea, North America, Europe and the Middle East.

“This form of attack is an advanced form of social engineering designed to manipulate people into revealing sensitive information or taking actions they might not normally take,” Securonix researchers Dan Yuzwick and Tim Peck said in a new the report shared with The Hacker News.

Cyber ​​security

DEV#POPPER is an alias appointed to an active malware campaign that tricks developers into downloading mined software hosted on GitHub under the guise of a job interview. It overlaps with a company tracked by Palo Alto Networks Unit 42 called Contagious interview.

Signs that the campaign was broader and cross-platform emerged earlier this month when researchers uncovered artifacts targeting both Windows and macOS that delivered an updated version of the malware called BeaverTail.

Malicious programs

The attack chain document from Securonix is ​​more or less consistent in that threat actors pose as interviewers for a developer position and prompt candidates to download a ZIP archive for a coding job.

The archive contains an npm module that, once installed, runs obfuscated JavaScript (such as BeaverTail) that detects the operating system it’s running on and contacts a remote server to steal interesting data.

It is also capable of loading next-stage payloads, including a Python backdoor called InvisibleFerret, which is designed to collect detailed system metadata, access cookies stored in web browsers, execute commands, upload/download files, and log clicks keys and clipboard contents.

New features added to recent samples include the use of improved obfuscation, AnyDesk Remote Monitoring and Management (RMM) software for security, and improvements to the FTP mechanism used for data theft.

In addition, the Python script acts as a conduit to run a helper script that is responsible for stealing sensitive information from various web browsers – Google Chrome, Opera and Brave – on various operating systems.

“This sophisticated extension of the original DEV#POPPER campaign continues to use Python scripts to execute a multi-stage attack focused on extracting sensitive information from victims, but now with much more robust capabilities,” the researchers said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google ordered to pay 314 million for abuse of cellular Android users without permission

July 4, 2025

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google ordered to pay 314 million for abuse of cellular Android users without permission

July 4, 2025

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google ordered to pay 314 million for abuse of cellular Android users without permission

July 4, 2025

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.