Remove Cryptocurrency Remove Download Remove Social Engineering Remove System Administration
article thumbnail

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

Treasury Department warning of a North Korean state-sponsored advanced persistent threat (APT) known as the Lazarus Group targeting cryptocurrency and blockchain companies. The threat actors use social engineering to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems.

article thumbnail

North Korean Lazarus APT group targets blockchain tech companies

Malwarebytes

A new advisory issued by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the US Treasury Department (Treasury), highlights the cyberthreats associated with cryptocurrency thefts and tactics used by a North Korean state-sponsored advanced persistent threat (APT) group since at least 2020.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Linux Malware Shikitega Can Take Full Control of Devices

eSecurity Planet

The Shikitega attack consists of a “multistage infection chain where each module responds to a part of the payload and downloads and executes the next one,” the AT&T researchers wrote. Once the CRONs are set, there’s no need to keep downloaded files, so the malware deletes them to evade detection. Multistage Infection Chain.

Malware 116
article thumbnail

Updates from the MaaS: new threats delivered through NullMixer

Security Affairs

Such was related to a worldwide malware operation known as NullMixer, a controversial and widespread malware delivery maneuver based on SEO poisoning and social engineering technique to lure tech-savvy users, including IT personnel. After this, it downloads the payload and executes it through the “Process.Start”.NET

Malware 85