Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation

Fortnite Maker Epic Games resolves anti-trust cases against Samsung

ChatGpt is testing a mysterious new feature called “Study Together.”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hackers will develop ferret malware via a fake employment interview with MacOS
Identity

North Korean hackers will develop ferret malware via a fake employment interview with MacOS

userBy userFebruary 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringFebruary 4, 2025LingeringRavy LakshmananMalware /cryptocurrency

Interview of fake employment about macOS

It has been observed to provide a collection of Apple MacOS Malware shares called Ferret as a part of the employment interview process, which is behind the contemporary interview campaign.

“The target is usually required to communicate with an interviewer through or update the necessary software such as VCAM and camera camera in virtual conferences.”

The first infectious interview that was discovered in the latter half of 2023 was a sustainable Hacking Crew to distribute malware to future targets through fake NPM packages and native apps that were disguised as video conferencing software. It is an effort. It is also tracked as DeceptiveDevelopment and Dev # Popper.

These attack chains are designed to drop JavaScript -based malware known as Beavertail. This allows you to distribute a python backdoor named InvisibleFerret in addition to harvesting sensitive data from web browsers and Crypto wallets.

Cyber ​​security

In December 2024, the Japanese Cyber ​​Security Company NTT Security Holdings stated that the JavaScript malware was configured to acquire and execute another Malware known as OTTERCOOKEE.

The discovery of the Maruwet ferret family, which was first discovered at the end of 2024, suggests that threat actors are actively refining tactics to avoid detection.

This uses a clickfix -style approach and copies and executes malicious commands on the Apple Macos system via the terminal app to address the problem of accessing cameras and microphones via a web browser. That is included.

According to security researchers Taylor Monahan, the user name @tayvano_ is due to approaching the target of Linkedin by promoting the attacker to be a recruiter and promoting the video evaluation. The ultimate goal is to discharge the victim’s meta mask wallet and drop the Golang -based backdoor and Steller designed to execute the host command.

MacOS Malware

Some of the components associated with malware are called FrieNDRYFERRET and Frostyferret_ui. Sentinelone stated that it has identified another set of artifacts named FlexibleFerret, which helps establish the persistence of the macOS system infected by Launchhagent.

Also, the command and control (C2) server is designed to download an indefinite payload, which is no longer responsive.

Furthermore, it has been observed to be propagated by opening fake problems in a legitimate gitHub repository, and refers to the diversification of attack methods again.

“This suggests that threat stakeholders are pleased to expand their vector by making malware more generally targeted beyond the specific targeting of job seekers,” he said. I did it.

This disclosure will take place a few days after the supply chain security company Socket detailed the malicious NPM package, postCSS-Optimizer, including Beavertail Malware. The library can be downloaded from the NPM registry at the time of writing.

Cyber ​​security

“In a legal postcss library with over 16 billion downloads, threat actors aim to steal the qualifications of Windows, MacOS, and Linux systems as a whole, and to infect developers’ systems with data experimental functions. Masu said, “Kirill Boychenko and Peter Van Dear Gee, a security researcher.

This development is following the discovery of a new campaign installed by a threat actor of APT37 (also known as ScarCruft) lined up in North Korea. A group chat via a K -Messenger Platform from an infringed user computer.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePayPal (PYPL) Q4 revenue
Next Article OUNO will be the official partner of Excel London
user
  • Website

Related Posts

CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation

July 8, 2025

The SEO addiction campaign targets over 8,500 SMB users with malware disguised as AI tools

July 7, 2025

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

July 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation

Fortnite Maker Epic Games resolves anti-trust cases against Samsung

ChatGpt is testing a mysterious new feature called “Study Together.”

iOS 26 Beta 3 Dial Back Liquid Glass

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.