{"id":63539,"date":"2023-11-03T08:35:15","date_gmt":"2023-11-03T12:35:15","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=63539"},"modified":"2023-11-03T08:35:18","modified_gmt":"2023-11-03T12:35:18","slug":"apple-macos-malware-targets-blockchain-community-engineers","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/apple-macos-malware-targets-blockchain-community-engineers\/","title":{"rendered":"Apple MacOS Malware Targets Blockchain Community Engineers"},"content":{"rendered":"\n<p>A newly detected malware on Apple's macOS associated with the <a href=\"https:\/\/coinscreed.com\/staging\/north-korean-lazarus-group-holds-almost-50m-worth-of-crypto.html\" target=\"_blank\" rel=\"noreferrer noopener\">North Korean hacking group Lazarus <\/a>reportedly targets blockchain engineers of cryptocurrency exchange platforms.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"706\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12-1024x706.png\" alt=\"Apple MacOS Malware Targets Blockchain Community Engineers\" class=\"wp-image-63543\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12-1024x706.png 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12-300x207.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12-768x529.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12-18x12.png 18w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12-750x517.png 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12-1140x786.png 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12.png 1187w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Apple MacOS Malware Targets Blockchain Community Engineers<\/figcaption><\/figure>\n\n\n\n<p>Analysis by Elastic Security Labs reveals that the covert backdoor of the malicious software &#8220;KandyKorn&#8221; for macOS can perform the following operations: data retrieval, directory listing, file upload\/download, secure deletion, process termination, and command execution.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"1020\" height=\"584\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-11.png\" alt=\"\" class=\"wp-image-63541\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-11.png 1020w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-11-300x172.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-11-768x440.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-11-18x10.png 18w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-11-750x429.png 750w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/><figcaption class=\"wp-element-caption\"><em>MacOS malweare (REF7001) execution flow. Source: elastic.co<\/em><\/figcaption><\/figure>\n\n\n\n<p>The preceding flowchart delineates the sequential actions executed by the malware to compromise and seize control of users' computers. The perpetrators initially disseminated Python-based modules through <a href=\"https:\/\/discord.com\/servers\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Discord channels<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> by assuming the identities of community members.<\/p>\n\n\n\n<p>Succumbing to an arbitrage algorithm that is specifically engineered to generate profits automatically, the social engineering assaults deceive members of the community into downloading a hazardous ZIP archive bearing the name &#8216;Cross-platform Bridges.zip.' <\/p>\n\n\n\n<p>Nevertheless, thirteen malicious modules are imported into the file and collaborate to take and manipulate data. The report was as follows:<\/p>\n\n\n\n<p><em>\u201cWe observed the threat actor adopting a technique we have not previously seen them use to achieve persistence on macOS, known as execution flow hijacking.\u201d<\/em><\/p>\n\n\n\n<p>Motivated primarily by financial gain and not espionage, their other principal operational focus, Lazarus, continues to target the <a href=\"https:\/\/coinscreed.com\/staging\/how-cryptocurrency-is-impacting-the-music-industry.html\" target=\"_blank\" rel=\"noreferrer noopener\">cryptocurrency industry<\/a>.<\/p>\n\n\n\n<p>The presence of KandyKorn emphasizes that Lazarus has a clear intention of targeting macOS, demonstrating the threat organization's exceptional capability to develop subtle yet sophisticated malware specifically designed for Apple computers.<\/p>\n\n\n\n<p>A popular Telegram bot known as Unibot, which was recently exploited to snipe transactions on the decentralized exchange Uniswap, caused the token's price to plummet by 40% in a single hour.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/TeamUnibot?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">@TeamUnibot<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>  seems exploited, the exploiter transfers memecooins from <a href=\"https:\/\/twitter.com\/hashtag\/unibot?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#unibot<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> users and is exchanging them for the <a href=\"https:\/\/twitter.com\/search?q=%24ETH&src=ctag&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">$ETH<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> right now.<br><br>The current exploit size is ~$560K<br><br>Exploiter address:<a href=\"https:\/\/t.co\/ysyTmgUAit\" target=\"_blank\">https:\/\/t.co\/ysyTmgUAit<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> <a href=\"https:\/\/t.co\/MF85Fdk892\" target=\"_blank\">pic.twitter.com\/MF85Fdk892<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; lmk.fun \ud83e\udd9c (Prev. Scopescan) (@lmkfun) <a href=\"https:\/\/twitter.com\/lmkfun\/status\/1719222329224704307?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">October 31, 2023<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>Consequent to the notification of Unibot users by the <a href=\"https:\/\/coinscreed.com\/staging\/blockchain-analytics-firm-elliptic-raises-60m-to-advance-its-crypto-analytics-service.html\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain analytics<\/a> firm Scopescan regarding an ongoing intrusion, an official source subsequently corroborated the situation:<\/p>\n\n\n\n<p><em>\u201cWe experienced a token approval exploit from our new router and have paused our router to contain the issue.\u201d<\/em><\/p>\n\n\n\n<p>Unibot has pledged to provide compensation to all users who incurred financial losses as a result of the contract exploit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A newly detected malware on Apple&#8217;s macOS associated with the North Korean hacking group Lazarus reportedly targets blockchain engineers of cryptocurrency exchange platforms. Analysis by Elastic Security Labs reveals that the covert backdoor of the malicious software &#8220;KandyKorn&#8221; for macOS can perform the following operations: data retrieval, directory listing, file upload\/download, secure deletion, process termination, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":63543,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[130],"tags":[408,17060,4231],"class_list":["post-63539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain-news","tag-apple","tag-macos","tag-malware"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-12.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/63539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=63539"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/63539\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/63543"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=63539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=63539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=63539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}