![Interview of fake employment about macOS Interview of fake employment about macOS](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj5mEwNHiHEc1VFQNd4XQqmcdYbMJmCADEzJQukNSzCVqN6MQoKZ27YgsyYrJtpCl9XNmFkBFeeWWvM-2oidZAYTme-m4FJE4zyKrWtPtS8QgvxY_fXOBq3fy46Fsa_pLxNBHRHmZjShZDJEHq_VRRjZvzCoPpL-iQFcIaxU9T1ViNjIPY297UWaLuUShO/s728-rw-e365/malware-code-job.png)
It has been observed to provide a collection of Apple MacOS Malware shares called Ferret as a part of the employment interview process, which is behind the contemporary interview campaign.
“The target is usually required to communicate with an interviewer through or update the necessary software such as VCAM and camera camera in virtual conferences.”
The first infectious interview that was discovered in the latter half of 2023 was a sustainable Hacking Crew to distribute malware to future targets through fake NPM packages and native apps that were disguised as video conferencing software. It is an effort. It is also tracked as DeceptiveDevelopment and Dev # Popper.
These attack chains are designed to drop JavaScript -based malware known as Beavertail. This allows you to distribute a python backdoor named InvisibleFerret in addition to harvesting sensitive data from web browsers and Crypto wallets.
![Cyber security](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg)
In December 2024, the Japanese Cyber Security Company NTT Security Holdings stated that the JavaScript malware was configured to acquire and execute another Malware known as OTTERCOOKEE.
The discovery of the Maruwet ferret family, which was first discovered at the end of 2024, suggests that threat actors are actively refining tactics to avoid detection.
This uses a clickfix -style approach and copies and executes malicious commands on the Apple Macos system via the terminal app to address the problem of accessing cameras and microphones via a web browser. That is included.
According to security researchers Taylor Monahan, the user name @tayvano_ is due to approaching the target of Linkedin by promoting the attacker to be a recruiter and promoting the video evaluation. The ultimate goal is to discharge the victim’s meta mask wallet and drop the Golang -based backdoor and Steller designed to execute the host command.
![MacOS Malware MacOS Malware](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9iQM_wf_H6MJP-t8t0EuEpM97zBhmFC2GtFJcaj4nOa8cvP1AdSpxu1MPn7kpvrv2Unw8wxKqjL3nzoNVzfpyWbO-3uWP0Q7a3epNl9WO5AP5jC9jmdnaI6URroKy7BPea14SJwK9ayKHvQy7vo7SGYOmziJnXjfzYbVP_mUUY-FKyL2vrRVdle2ntVew/s728-rw-e365/malware.png)
Some of the components associated with malware are called FrieNDRYFERRET and Frostyferret_ui. Sentinelone stated that it has identified another set of artifacts named FlexibleFerret, which helps establish the persistence of the macOS system infected by Launchhagent.
Also, the command and control (C2) server is designed to download an indefinite payload, which is no longer responsive.
Furthermore, it has been observed to be propagated by opening fake problems in a legitimate gitHub repository, and refers to the diversification of attack methods again.
“This suggests that threat stakeholders are pleased to expand their vector by making malware more generally targeted beyond the specific targeting of job seekers,” he said. I did it.
This disclosure will take place a few days after the supply chain security company Socket detailed the malicious NPM package, postCSS-Optimizer, including Beavertail Malware. The library can be downloaded from the NPM registry at the time of writing.
![Cyber security](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc0hgq4JZKi-PJjUZ4kdb5ficmXr3IPOg6noFF558_qZ-gXm7vb0OzXU0NzsPAxaqca2tLI5j8NgJW731W0_CuPrUerOmSrZSt4IeANQp6VAQsIAQUzv6aJsxBD6poxHfELq0bcbeevSVy5AyOb9ganALMoA140nZoLOtSb0ck2AZ5rZgb9mWDEyVsbvqK/s728-rw-e100/saas-security-v1-d.png)
“In a legal postcss library with over 16 billion downloads, threat actors aim to steal the qualifications of Windows, MacOS, and Linux systems as a whole, and to infect developers’ systems with data experimental functions. Masu said, “Kirill Boychenko and Peter Van Dear Gee, a security researcher.
This development is following the discovery of a new campaign installed by a threat actor of APT37 (also known as ScarCruft) lined up in North Korea. A group chat via a K -Messenger Platform from an infringed user computer.
Source link