{"id":195527,"date":"2023-11-03T13:39:53","date_gmt":"2023-11-03T13:39:53","guid":{"rendered":"https:\/\/tokenstalk.info\/?p=195527"},"modified":"2023-11-03T13:39:53","modified_gmt":"2023-11-03T13:39:53","slug":"apple-macos-malware-targets-crypto-community-and-engineers","status":"publish","type":"post","link":"https:\/\/tokenstalk.info\/crypto\/apple-macos-malware-targets-crypto-community-and-engineers\/","title":{"rendered":"Apple MacOS malware targets crypto community and engineers"},"content":{"rendered":"
A new malware discovered on Apple\u2019s macOS \u2014 tied to the North Korean hacking group Lazarus \u2014 has reportedly targeted blockchain engineers of a cryptocurrency exchange platform.<\/p>\n
The macOS malware \u201cKandyKorn\u201d is a stealthy backdoor capable of data retrieval, directory listing, file upload\/download, secure deletion, process termination and command execution, according to an analysis by Elastic Security Labs. <\/p>\n
<\/p>\n
The above flowchart explains the steps taken by the malware to infect and hijack users\u2019 computers. Initially, the attackers spread Python-based modules via Discord channels by impersonating community members. <\/p>\n
The social engineering attacks trick community members into downloading a malicious ZIP archive named \u201cCross-platform Bridges.zip\u201d \u2014 imitating an arbitrage bot designed for automated profit generation. However, the file imports 13 malicious modules that work together to steal and manipulate information. The report read:<\/p>\n
\u201cWe observed the threat actor adopting a technique we have not previously seen them use to achieve persistence on macOS, known as execution flow hijacking.\u201d<\/p><\/blockquote>\n
The cryptocurrency sector remains a primary target for Lazarus, primarily motivated by financial gain rather than espionage, their other main operational focus.<\/p>\n
The existence of KandyKorn underscores that macOS is well within Lazarus\u2019 targeting range, showcasing the threat group\u2019s remarkable ability to craft sophisticated and inconspicuous malware tailored for Apple computers.<\/p>\n
Related: <\/em><\/strong>Onyx Protocol exploiter begins siphoning $2.1M loot on Tornado Cash<\/em><\/strong><\/p>\n
A recent exploit on Unibot, a popular Telegram bot used to snipe trades on the decentralized exchange Uniswap, crashed the token\u2019s price by 40% in one hour.<\/p>\n
Blockchain analytics firm Scopescan alerted Unibot users about an ongoing hack, which was later confirmed by an official source:<\/p>\n
\u201cWe experienced a token approval exploit from our new router and have paused our router to contain the issue.\u201d<\/p><\/blockquote>\n
Unibot committed to compensating all users who lost funds due to the contract exploit.<\/p>\n
Magazine: <\/em><\/strong>Slumdog billionaire 2: \u2018Top 10\u2026 brings no satisfaction\u2019 says Polygon\u2019s Sandeep Nailwal<\/em><\/strong><\/p>\n