A cyber espionage APT group called Lazarus hits the cryptocurrency exchanges using fake installer and macOS malware using variously sophisticated techniques.
Lazarus group widely known for cyber attacks against various financial institutions and they have successfully compromised several banks and other financial sectors.
In this case attackers targeting various platform and developing malware based on the targets and currently they are using new macOS malware to compromise the cryptocurrency exchange and this is the first time Lazarus APT using macOS malware.
This attack is performing both windows as well as macOS platform since many developers and engineers are switching to using macOS.
Attackers found a way to create a legitimate looking business and inject a malicious payload into a “legitimate looking” software update mechanism.
This Malware distributed through this Celas LLC Tool, but researchers said,” We cannot say with full certainty whether Celas LLC was compromised and the threat actor abused it to push malware through an update mechanism.
A researcher named this operation as AppleJeus because of the developer did this project under the name of Jeus.
The victim had been infected with the help of a trojanized cryptocurrency trading application and the user installed this program via a download link delivered over email.
Attackers distributing the malicious installer via update for a trading application called Celas Trade Pro which is one of the legitimate-looking application developed by Celas Limited that is work as an all-in-one style cryptocurrency trading program.
But the installation package has performed a very suspicious updater at the end of the installation process where installer immediately runs the Updater.exe module with the “CheckUpdate” parameter.
Updater.exe is used to collect the victim’s host information and send it back to the server and the malware create a unique string for each infected system to the unique identifier of the infected Windows host.
In order to infect the macOS, A hidden updater called auto updater is being installed after the installation of trading program tool Celas.
Once the system rebooted then It keeps contacting the command and control (C2) server in order to download and run an additional executable from the server.
According to kaspersky researchers,The trojanized updater works similar to the Windows version in many ways. Both applications are implemented using a cross-platform QT framework. Upon launch, the downloader creates a unique identifier for the infected host using a “%09d-%06d” format string template. Next, the app collects basic system information.
later threat actor delivers the malicious payload and the main function of this malware is to implant the Fall chill backdoor loader linked to several files.
This backdoor contains full future to fully control the infected host and these backdoor capabilities are common as previous backdoors.
Android Device With Open ADB Ports Exploited to Spread Satori Variant of Mirai Botnet
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…