Currencies32904
Market Cap$ 2.79T-1.20%
24h Spot Volume$ 23.68B-2.26%
DominanceBTC58.83%+0.27%ETH7.73%+0.04%
ETH Gas0.43 Gwei
Cryptorank
MainNewsJamf Spots N...

Jamf Spots New MacOS Crypto Malware Attributed to North Korea’s Lazarus BlueNoroff Group


Nov, 08, 2023
2 min read
by Cryptonews
Source: Pixabay

BlueNoroff, the notorious hackers’ group with links to North Korea’s Lazarus, has debuted a fresh MacOS malware targeting financial institutions.

Uncovered by researchers from the Apple device management firm – Jamf, the perpetrators have been hiding behind a legitimate-looking cryptocurrency exchange.

According to a detailed report by Jamf published Tuesday, the malicious payload communicates with swissborg[.]blog domain, controlled by the attackers. The actors registered the domain on May 31 and hosted at an IP address, part of BlueNoroff infrastructure.

“The malware splits the command and control (C2) URL into two separate strings that get concatenated together. This is likely an attempt to evade static-based detection,” the report explains.

The news comes days after the infamous Lazarus Group used a new malware dubbed “Kandykorn” to target a crypto exchange. The group apparently deployed the advanced Kandykorn malware through a complex 5-stage process, featuring reflective loading.

BlueNoroff is a threat actor that specifically targets cryptocurrencies and crypto startups, and financial entities such as banks.

Similarities to RustBucket Campaign

Jamf Threat Labs noted that the new malware, discovered at a later-stage, shares similar characteristics with BlueNoroff’s RustBucket campaign.

Identified in April this year, the campaign works to compromise macOS devices. Actors reach targets directly claiming to be an investor or head hunter, offering beneficial partnerships.

BlueNoroff also created a domain for the RustBucket campaign, that looks like it belongs to a legitimate crypto company. The aim was to blend with network activity to evade detection.

The Jamf team used the same method to detect the new malware. The new MacOS crypto-malware has links to several URLs from one domain, used for its communication, Jamf noted.

“The malware is written in Objective-C and operates as a very simple remote shell that executes shell commands sent from the attacker server.”

The perpetrators likely use the malware at a later stage to manually run commands after compromising a system, experts wrote. However, the researchers cleared that this malware at a glance is “very different” from the previously mentioned RustBucket malware.

“But the attacker’s focus in both cases seems to be providing simple remote shell capability,” they added.

Though the malware looks fairly simple it is “still very functional,” helping attackers carry out their objectives, the report said. The Jamf team names the new detection as “ObjCShellz,” considering it as a part of the RustBucket campaign.

“Based on previous attacks performed by BlueNoroff, we suspect that this malware was a late stage within a multi-stage malware delivered via social engineering.”

The post Jamf Spots New MacOS Crypto Malware Attributed to North Korea’s Lazarus BlueNoroff Group appeared first on Cryptonews.

Read the article at Cryptonews

Read More

Crypto Investors React to Trump’s Tariffs Announcement: Here’s What Happened

Crypto Investors React to Trump’s Tariffs Announcement: Here’s What Happened

Hours before the announcement, investors rushed to move their assets to exchanges in ...
Apr, 06, 2025
2 min read
by CryptoPotato
President Trump May Trigger Decorrelation Between Bitcoin and the Nasdaq, According to Macro Guru Luke Gromen

President Trump May Trigger Decorrelation Between Bitcoin and the Nasdaq, According to Macro Guru Luke Gromen

Macro investor Luke Gromen says that the White House may have caused a massive change...
Apr, 06, 2025
3 min read
by The Daily Hodl
MainNewsJamf Spots N...

Jamf Spots New MacOS Crypto Malware Attributed to North Korea’s Lazarus BlueNoroff Group


Nov, 08, 2023
2 min read
by Cryptonews
Source: Pixabay

BlueNoroff, the notorious hackers’ group with links to North Korea’s Lazarus, has debuted a fresh MacOS malware targeting financial institutions.

Uncovered by researchers from the Apple device management firm – Jamf, the perpetrators have been hiding behind a legitimate-looking cryptocurrency exchange.

According to a detailed report by Jamf published Tuesday, the malicious payload communicates with swissborg[.]blog domain, controlled by the attackers. The actors registered the domain on May 31 and hosted at an IP address, part of BlueNoroff infrastructure.

“The malware splits the command and control (C2) URL into two separate strings that get concatenated together. This is likely an attempt to evade static-based detection,” the report explains.

The news comes days after the infamous Lazarus Group used a new malware dubbed “Kandykorn” to target a crypto exchange. The group apparently deployed the advanced Kandykorn malware through a complex 5-stage process, featuring reflective loading.

BlueNoroff is a threat actor that specifically targets cryptocurrencies and crypto startups, and financial entities such as banks.

Similarities to RustBucket Campaign

Jamf Threat Labs noted that the new malware, discovered at a later-stage, shares similar characteristics with BlueNoroff’s RustBucket campaign.

Identified in April this year, the campaign works to compromise macOS devices. Actors reach targets directly claiming to be an investor or head hunter, offering beneficial partnerships.

BlueNoroff also created a domain for the RustBucket campaign, that looks like it belongs to a legitimate crypto company. The aim was to blend with network activity to evade detection.

The Jamf team used the same method to detect the new malware. The new MacOS crypto-malware has links to several URLs from one domain, used for its communication, Jamf noted.

“The malware is written in Objective-C and operates as a very simple remote shell that executes shell commands sent from the attacker server.”

The perpetrators likely use the malware at a later stage to manually run commands after compromising a system, experts wrote. However, the researchers cleared that this malware at a glance is “very different” from the previously mentioned RustBucket malware.

“But the attacker’s focus in both cases seems to be providing simple remote shell capability,” they added.

Though the malware looks fairly simple it is “still very functional,” helping attackers carry out their objectives, the report said. The Jamf team names the new detection as “ObjCShellz,” considering it as a part of the RustBucket campaign.

“Based on previous attacks performed by BlueNoroff, we suspect that this malware was a late stage within a multi-stage malware delivered via social engineering.”

The post Jamf Spots New MacOS Crypto Malware Attributed to North Korea’s Lazarus BlueNoroff Group appeared first on Cryptonews.

Read the article at Cryptonews

Read More

Crypto Investors React to Trump’s Tariffs Announcement: Here’s What Happened

Crypto Investors React to Trump’s Tariffs Announcement: Here’s What Happened

Hours before the announcement, investors rushed to move their assets to exchanges in ...
Apr, 06, 2025
2 min read
by CryptoPotato
President Trump May Trigger Decorrelation Between Bitcoin and the Nasdaq, According to Macro Guru Luke Gromen

President Trump May Trigger Decorrelation Between Bitcoin and the Nasdaq, According to Macro Guru Luke Gromen

Macro investor Luke Gromen says that the White House may have caused a massive change...
Apr, 06, 2025
3 min read
by The Daily Hodl