This article was published on December 4, 2019

North Korean hackers may be behind malware distributed by cryptocurrrency trading platform

Luckily, it doesn't really do anything though


North Korean hackers may be behind malware distributed by cryptocurrrency trading platform

A new macOS malware packaged by a cryptocurrency trading platform has been uncovered by security researchers. The malware is believed to be the work of notorious North Korean hacking group Lazarus.

Security researcher Dinesh Devadoss tweeted their discovery of the malware yesterday. A detailed analysis of the malware can be read here.

The malware masquerades as a cryptocurrency arbitrage platform, a service typically used to take advantage of price discrepancies across other digital asset exchanges.

According to researchers, the malware is designed to retrieve a payload from a remote server and then run it in the infected machine’s memory.

The 💜 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It's free, every week, in your inbox. Sign up now!

Bleeping Computer reports that the malware goes virtually undetected by VirusTotal.

Researchers also say that there are some “clear overlaps” with another malware called AppleJeus distributed by Lazarus.

If you haven’t heard that name before, where have you been? Lazarus are nortorious for launching high value attacks going after cryptocurrency hoards.

Last year, Hard Fork reported that the hacking group had stolen more than $570 million worth of cryptocurrency across five attacks.

The malicious package, named UnionCryptoTrader was hosted on the fake arbitrage platform’s website.

The malware is programmed to run on each system reboot and collect information about the system’s serial number and OS version.

It might sound worrisome, however, the remote command and control server isn’t responding with a malicious payload. Either something is on the way, or the hacking group responsible for this malware is testing its techniques for future attacks.

As Bleeping Computer points out, exectuing a file in memory is a rare strategy for macOS -based systems and it’s just starting to gain popularity.

Luckily, this one has been spotted before anything too nefarious has happened. Update your malware definitions, stat!

H/T – Bleeping Computer

Get the TNW newsletter

Get the most important tech news in your inbox each week.

Also tagged with