Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Malicious browser extensions will infect 722 users across Latin America since early 2025

Trump officials vow to lift school separation orders

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Cross Platform JavaScript Stiller targets encrypted wallets with a new Lazarus Group Campaign
Identity

Cross Platform JavaScript Stiller targets encrypted wallets with a new Lazarus Group Campaign

userBy userFebruary 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringFebruary 5, 2025LingeringRavy LakshmananCryptocurrency /data infringement

JavaScript Stealer targets encryption wallets

The North Korea -related Lazaro Group has been linked to an active campaign that uses fake Linkedin jobs in cryptocurrencies and travel departments to provide malware that can infect windows, Maco, and Linux operating systems.

According to the Cyber ​​Security Company BitDefender, fraud starts with a message sent to a professional social media network, inviting remote work, part -time flexibility, and good wages.

“If the target expressed interest, the scammers will expand the” employment process “by the scammers demanding a resume or personal GitHub repository link,” said Romanian companies in a report shared with Hacker News. Ta.

Cyber ​​security

“At first glance, it looks innocent, but these requests are useful for unwilling purposes, such as harvesting personal data and lending a legitimate veneer of interaction.”

When the demanded details are obtained, the attack is a recruiter and the threat actor shares a link to the GitHub or Bitbucket repository, which contains a minimum executable product (MVP) version of the expected distributed type. Go to the stage (DEX) project and the victims to check it and provide feedback.

What exists in the code is a difficult -to -read script that is configured to acquire the next stage from API.NPOINT.[.]IO is a cross -platform JavaScript informationsteller that can harvest data from various cryptocurrency wallet extensions that can be installed in the victim’s browser.

Stiller is also a loader to obtain a Python -based backdoor in charge of monitoring the clipboard content change, maintaining permanent remote access, and deleting additional malware.

At this stage, it is noteworthy that the tactics documented by BitDefender overlap with the known attack activity cluster (also known as DecteptedEVELOPMENT and DEV # Popper). 。

Malware deployed by Python Malware is a .NET binari that can communicate with the command and control (C2) server, remove the basic system information, download the TOR Proxial bar that provides another payload. You can launch data, log key strokes, and cryptocurrency minor for SIPHON.

“The threat actor infection chain is complicated, contains malicious software described in multiple programming languages, and uses various technologies, such as multi -layered Python scripts that are recursive and executed. According to JavaScript Stiller, which harvests the browser data first, the payloading and security tools can be launched, and the configuration of TOR Proxy and the encryption mining workers can be launched. Base stages are possible.

Cyber ​​security

There is evidence suggesting that these efforts are very extensive, and the report shared by Linkedin and Reddit has received a slight fine adjustment throughout the attack chain. In some cases, the candidate is asked to clon the web3 repository as part of the interview process and execute it locally, but in other cases, correct the bug intentionally introduced in the code. It will be instructed.

One of the Bitbucket repositories in question refers to a project named “miketoken_v2”. It cannot be accessed on the code hosting platform.

This disclosure is performed on the day after the disclosure is used to provide a transmission interview campaign to provide another malware code name FlexibleEferret.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCherry Venture has raised a new $500 million fund that is above the early stage, but is that enough?
Next Article Bytedance will be released Omnihuman-1: AI to convert photos into real human videos
user
  • Website

Related Posts

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

June 8, 2025

Malicious browser extensions will infect 722 users across Latin America since early 2025

June 8, 2025

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Malicious browser extensions will infect 722 users across Latin America since early 2025

Trump officials vow to lift school separation orders

Should the government ban AI-generated humans to stop the collapse of social trust?

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Should the government ban AI-generated humans to stop the collapse of social trust?

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.