Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean hackers have targeted cryptocurrency users on LinkedIn with the RustDoor malware
Global Security

North Korean hackers have targeted cryptocurrency users on LinkedIn with the RustDoor malware

AdminBy AdminSeptember 16, 2024No Comments4 Mins Read
RustDoor Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 16, 2024Ravi LakshmananFinancial Security / Malware

RustDoor malware

Cybersecurity researchers continue to warn of attempts by North Korean threat actors to direct potential victims to LinkedIn to deliver malware called RustDoor.

The latest advisory comes from Jamf Threat Labs, which said it discovered an attempted attack in which a user contacted a professional social network claiming to be a recruiter for a legitimate decentralized cryptocurrency exchange (DEX) called STON.fi.

The malicious cyber activity is part of a multi-pronged campaign by cyber threat actors supported by the Democratic People’s Republic of Korea (DPRK) to infiltrate networks of interest under the guise of conducting interviews or coding.

The financial and cryptocurrency sectors are among the prime targets for state-sponsored adversaries seeking to generate illicit revenue and achieve a range of goals based on regime interests.

Cyber ​​security

These attacks take the form of “strictly individual social engineering campaigns that are difficult to detect” targeting employees of decentralized finance (“DeFi”), cryptocurrency and similar companies, as the US Federal Bureau of Investigation (FBI) recently highlighted in an advisory.

One notable indicator of North Korean social engineering activity involves requests to execute code or download applications on company-owned devices or devices that have access to the company’s internal network.

Another aspect worth mentioning is that such attacks also include “requests for ‘pre-employment testing’ or debugging exercises that involve the execution of non-standard or unknown Node.js packages, PyPI packages, scripts or repositories GitHub.”

There were cases of such tactics widely documented Art last weekshighlighting the constant evolution of the tools used in these campaigns against the targets.

The latest attack chain identified by Jamf is that the victim was tricked into downloading a mined Visual Studio project as part of a supposed coding challenge that embeds bash commands into it to download two different second-stage payloads (“VisualStudioHelper” and “zsh_env”) from the same functionality.

In the second stage, the malware is RustDoor, which the company tracks as Thiefbucket. At the time of writing, none of the malware protection mechanisms have marked with a flag test compression file as malicious. It was uploaded to the VirusTotal platform on August 7, 2024.

“Configuration files embedded in two separate malware samples indicate that VisualStudioHelper will be stored via cron and zsh_env will be stored via a zshrc file,” said researchers Jaran Bradley and Ferdous Saljuki.

RustDoor, a backdoor for macOS, was documented for the first time Bitdefender in February 2024 in connection with a malware campaign targeting cryptocurrency firms. Subsequent analysis by S2W revealed a duplicate Golang variant GateDoor which is designed to infect Windows machines.

Jamf’s findings are significant not only because they are the first time malware has been officially attributed to a North Korean threat actor, but also because the malware is written in Objective-C.

Cyber ​​security

VisualStudioHelper is also designed to act as an information stealer, collecting files specified in the configuration, but only after the user is prompted for their system password, posing as if it came from Visual Studio to avoid suspicion.

However, both payloads operate as a backdoor and use two different servers for command and control (C2) communication.

“Threat actors remain vigilant in finding new ways to target those working in the crypto industry,” the researchers said. “It’s important to educate your employees, including developers, not to be hesitant to trust anyone who connects on social media and asks users to run any type of software.

“These social engineering schemes perpetrated by the DPRK come from those who speak English well and enter the conversation after well researching their target.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.