Monday, November 13, 2023

Watch out - that amazing job offer could actually just be a crypto-stealing scam, Microsoft warns

The BlueNoroff cybercrime campaign appears to be going from strenght to strenght after Microsoft spotted yet another criminal campaign it attributed to the North Korean hackers.

Redmond’s security pros recently found BlueNoroff (a part of the Lazarus Group advanced persistent threat, which it calls Sapphire Sleet) impersonating skills assessment portals and using them to steal people’s sensitive data or have them download malware

"Sapphire Sleet typically finds targets on platforms like LinkedIn and uses lures related to skills assessment," the Microsoft Threat Intelligence team said on X. "The threat actor then moves successful communications with targets to other platforms."


Reader Offer: $50 Amazon gift card with demo
Perimeter 81's Malware Protection intercepts threats at the delivery stage to prevent known malware, polymorphic attacks, zero-day exploits, and more. Let your people use the web freely without risking data and network security.

Preferred partner (What does this mean?

Distributing malware

BlueNoroff, but also Lazarus as a whole, is a threat actor that’s been seen using fake job ads and targeting professionals in the cryptocurrency industry for years now. With that in mind, the latest campaign that includes skills assessment portals is a “shift in the persistent actor’s tactics,” Microsoft said.

Late last week, security researchers from Jamf warned of a new macOS malware, called ObjCShellz, which was developed and distributed by BlueNoroff. It greatly overlaps with another macOS malware known as RustBucket. 

Microsoft said BlueNoroff usually distributed malware by sending malicious attachments or embedded links to pages hosted on GitHub. However, Microsoft’s quick reactions to remove these threats forced Sapphire Sleet to create a new network of websites used to distribute the malware, the researchers claim.

"Several malicious domains and subdomains host these websites, which entice recruiters to register for an account," the company added. "The websites are password-protected to impede analysis."

Lazarus Group is suspected to be under the direct command of the North Korean government. Its goals are not always the same, but are usually linked to stealing cryptocurrencies from targets in the West. The money, some sources are saying, are being used to sustain the government and build the nuclear weapons program

More from TechRadar Pro



from TechRadar - All the latest technology news https://ift.tt/NviXDML

No comments:

Post a Comment

Forget about Wi-Fi, your own private 5G network could be the answer to your connection woes — here's how to set one up for much cheaper than you think

Private 5G networks, where individuals or companies set up their own cellular connections, could potentially provide a viable alternative t...