Toward the start of the third quarter of this current year, researchers found that hackers were mimicking known identities in the crypto work, in chats in crypto groups in Slack and Discord. This was done when clients download the links they posted in chat Conversations.
A group of hackers known as the Lazarus group based in North Korea is suspected to be engaged with this after they have already attempted to steal the cryptocurrency funds from the South Korea cryptocurrency exchanges like Coinlink, YouBit, and Bithumb by utilizing their malware.
Only a couple of hours prior, one of the world’s best producers of anti-malware and antivirus, a Russian web security firm, Kaspersky, stated that this group of hackers had corrupted an undisclosed crypto exchange with the malware which is affecting both Windows and MacOS.
This was made possible after a representative of the exchange downloaded a fake application that was polluted with the malware in a fake SSL certified site. The name of the malware is called AppleJeus.
An announcement from the Russian web security organization, Kaspersky expressed that keeping in mind the end goal to “ensure that the OS platform was not an obstacle to infecting targets, it seems the attackers went the extra mile and developed malware for other platforms, including for macOS,” remarking:
“A version for Linux is apparently coming soon, according to the website. It’s probably the first time we see this APT group using malware for macOS.”
In a meeting with a Computer firm, leader of Kaspersky’s GReAT APAC team, Vitaly Kamluk said that:
“The fact that they developed malware to infect macOS users in addition to Windows users and – most likely – even created an entirely fake software company and software product in order to be able to deliver this malware undetected by security solutions, means that they see potentially big profits in the whole operation.”
For more updates, stay tuned to CoinTopper.com