Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
North Korean malware targets macOS with security bypass

North Korean malware targets macOS with security bypass

GrafaGrafa2024/11/13 08:00
By:Mahathir Bayena

Jamf Threat Labs has discovered malware developed by North Korean hackers that successfully bypassed Apple's security checks.

This malware was notable for being the first of its kind to compromise Apple’s macOS operating system, although it is not effective on updated systems.

The apps, which researchers believe to be experimental, were detected as clean by Microsoft’s VirusTotal scanner and were crafted using Go and Python programming languages, alongside the Google Flutter app development kit.

The malware used developer account signatures, and five of the six apps were temporarily notarised by Apple.

"The domains and techniques in the malware align closely with those used in other DPRK malware and show signs that, at one point in time, the malware was signed and had even temporarily passed Apple’s notarisation process,” Jamf Threat Labs stated.

It remains uncertain if the malware has been used in active attacks or if it was designed as a test for future use, but researchers indicated that it is likely a prelude to more sophisticated attempts.

The applications carried names related to the cryptocurrency sector, such as “New Updates in Crypto Exchange” and “CeFi,” hinting at potential targets within the crypto community.

When executed, some apps, like “New Updates in Crypto Exchange,” opened a modified version of the minesweeper game.

North Korean hackers have demonstrated adaptability and precision in past cyber campaigns, including an October exploit targeting Chrome vulnerabilities to steal crypto wallet information.

The United Nations has estimated that North Korean hackers have generated approximately $3 billion in illicit gains over the past six years, reinforcing their reputation for effective and organised operations.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!