InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: North Korean hackers target LinkedIn cryptocurrency users with RustDoor malware
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > North Korean hackers target LinkedIn cryptocurrency users with RustDoor malware
Technology

North Korean hackers target LinkedIn cryptocurrency users with RustDoor malware

September 17, 2024 4 Min Read
Share
RustDoor Malware
SHARE

Cybersecurity researchers continue to warn that North Korean threat actors are attempting to target potential victims on LinkedIn to deliver malware dubbed “RustDoor.”

The latest advisory comes from Jamf Threat Labs, which said it had discovered attempted attacks in which attackers contacted users on specialized social networks posing as recruiters for a legitimate decentralized cryptocurrency exchange (DEX) called STON.fi.

This malicious cyber activity is part of a multi-faceted campaign waged by Democratic People’s Republic of Korea (DPRK)-backed cyber threat actors to infiltrate networks of interest under the pretext of interviews and coding jobs.

The financial and cryptocurrency sectors are among the top targets for state-sponsored adversaries seeking to generate illicit revenue and achieve an ever-changing set of objectives based on the regime’s interests.

These attacks, as the US Federal Bureau of Investigation (FBI) noted in a recent advisory, take the form of “highly customized and hard-to-detect social engineering campaigns” targeting employees of decentralized finance (“DeFi”), cryptocurrency, and similar businesses.

One notable sign of North Korean social engineering activity is a request to run code or download an application on a company-owned device or a device with access to a company’s internal network.

Another aspect worth mentioning is that such attacks also include “requests to conduct ‘pre-employment testing’ or debugging exercises that involve the execution of non-standard or unknown Node.js packages, PyPI packages, scripts, or GitHub repositories.”

Incidents featuring these tactics have been widely documented in recent weeks, highlighting the continued evolution of the tools used in these attack campaigns against targets.

See also  How far will Harris advance in the polls after the debate?

In the latest attack chain discovered by Jamf, as part of a purported coding challenge, victims are tricked into downloading a booby-trapped Visual Studio project that contains an embedded bash command to download two different second-stage payloads with identical functionality: “VisualStudioHelper” and “zsh_env.”

This second stage malware is RustDoor, which the company tracks as Thiefbucket. At the time of writing, no anti-malware engines have flagged the packed coding test file as malicious. The file was uploaded to the VirusTotal platform on August 7, 2024.

“Configuration files embedded in two separate malware samples indicate that VisualStudioHelper persists via cron, and zsh_env persists via a zshrc file,” said researchers Jaron Bradley and Ferdous Saljooki.

RustDoor, a macOS backdoor, was first documented by Bitdefender in February 2024 in connection with a malware campaign targeting cryptocurrency companies. Subsequent analysis by S2W uncovered a Go-language variant called GateDoor aimed at infecting Windows machines.

Jamf’s findings are significant not only because they mark the first time this malware has been formally attributed to a North Korean threat actor, but also because the malware was written in Objective-C.

VisualStudioHelper is designed to act as an information stealer by collecting files specified in its configuration, but only after prompting the user for their system password, disguising it as if it was sent from a Visual Studio app to avoid suspicion.

However, both payloads act as backdoors and use two different servers for command and control (C2) communications.

“Threat actors remain vigilant in finding new ways to target those in the crypto industry,” the researchers said. “It is important to educate employees, including developers, not to trust individuals who connect with them on social media and ask users to run any kind of software.”

See also  Who is Naomi Watts' husband? Marriage to 'The Morning Show' actor Billy Crudup

“These social engineering schemes carried out by North Korea are carried out by people who are fluent in English and who research their targets before engaging in conversations.”

Share This Article
Twitter Copy Link
Previous Article New retro FPS Hands of Necromancy 2 is inspired by Heretic New retro FPS Hands of Necromancy 2 is inspired by Heretic
Next Article Welcome to the farm where cows, pigs and sheep are part of the climate curriculum Welcome to the farm where cows, pigs and sheep are part of the climate curriculum
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

The Solution is Cyber ​​Hygiene

The Solution is Cyber ​​Hygiene

Cybersecurity in healthcare has never been more urgent. As the…

September 19, 2024
mm

Enterprise LLM API: A top choice for powering LLM applications in 2024

Some big recent news stories have escalated the race for…

September 19, 2024
Authentication Bypass

GitLab fixes critical SAML authentication bypass vulnerability in CE and EE editions

GitLab has released a patch to address a critical flaw…

September 19, 2024
Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

A Chinese national has been indicted in the United States…

September 19, 2024
IoT Botnet

New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

Cybersecurity researchers have discovered a never-before-seen botnet made up of…

September 18, 2024

You Might Also Like

TrickMo Android Trojan
Technology

TrickMo Android Trojan exploits accessibility services to carry out banking fraud on devices

5 Min Read
Harvey Weinstein update: Convicted rapist indicted on additional sex crime charges
Celebrity

Harvey Weinstein update: Convicted rapist indicted on additional sex crime charges

5 Min Read
Google's AI Data Practices in Europe
Technology

Irish watchdog launches investigation into Google’s AI data practices in Europe

3 Min Read
Google Workspace
Technology

How to investigate ChatGPT activity in Google Workspace

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?