Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cross JavaScript Crypto Wallets Cross Platform in New Company Lazarus Group
Global Security

Cross JavaScript Crypto Wallets Cross Platform in New Company Lazarus Group

AdminBy AdminFebruary 5, 2025No Comments3 Mins Read
JavaScript Stealer Targets Crypto Wallets
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


05 February 2025Red LakshmananCryptocurrency / Data Violation

Mades Crypto Wallets for JavaScript Theft

North Korea is linked Group Lazarus was associated with an active company that uses the fake offers of LinkedIn Job in cryptocurrency and travel sectors to deliver malicious software capable of infecting windows, MacOS and Linux Operation Systems.

According to the Bitdefender Cybersecurity Company, the scam begins with a message sent on a professional social media network, which attracts them with the promise of remote work, flexibility for part -time and good payment.

“Once the goal expresses interest, the” hiring process “unfolds, and the fraudster asks a resume or even a personal GitHub repository,” Romanian firm – Note In a report that shared with Hacker News.

Cybersecurity

“Although it is seemingly innocent, these requests can serve as moody goals, such as harvesting personal data or a loan of legitimacy.”

After receiving the requested details, the attack goes to the next stage when the actor threatens under the guise of a recruiter divides the link to the GitHub or Bitbucket repository, which contains the minimum viable product version (MVP) of the alleged decentralized exchange (DEX) project and instructs the victims to check it and provide their feedback .

The code is present in the code is a clouded scenario that is tuned for a useful load to the next stage with API.Npoint (.) IO crossing JavaScript Information platform, which is able to collect data from various cryptocurrency wallet.

The theft is also doubled as a loader to get the back of the python, responsible for monitoring the changes of the contents of the clipboard, maintain permanent remote access and when additional malware.

At this point, it should be noted that the tactics recorded by Bitdefender are exposed with the famous cluster of attack activity Increased interview . name To abandon the theft of JavaScript called Beavertail and Python implant called Invisibibleferret.

Malicious software expanded with malicious Python software -This binary. In turn, the siphonic data, the magazine keys and the miner of cryptocurrency can.

“The infection of the actors threatens is complex, containing malicious software written in several programming languages, and using different technologies such as multilayered Python scenarios that recurs and perform themselves, theft of JavaScript, which is first and further useful loads and .Net, Based on .Net-based .Net capable of turning off safety tools, set up proxy and launch crypto-sows, “the bitdefer said.

Cybersecurity

There are data to assume LinkedIn and Redditwith minor settings to the overall attack chain. In some cases, the candidates are asked to clone the Web3 repository and launch it locally as part of the interview process, and in others it was instructed to intentionally introduce errors in the code.

One of the spoken storage bitbucket refers to the project specified “Miketoken_v2“It is no longer available on the hosting code platform.

Discovering information occurs through the day after Sentinelone disclosed What a contagious interview company is used to provide another flexible software for malware.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.