U.S. Warns Of Lazarus hackers Using Malicious Crypto Apps

Share post:

A joint report by CISA, the FBI and the U.S. Treasury Department has warned organizations in the crypto and blockchain industry about a new threat posed by the North Korean hacking group Lazarus.

Security agencies found that hackers using trojanized cryptocurrency applications are targeting organizations in these industries.

To carry out the attack, the hackers use social engineering to trick employees of cryptocurrency companies into downloading and running malicious Windows and macOS cryptocurrency apps.

The trojanized tools are then used to carry out various malicious activities, including accessing the target’s computers, spreading malware on their networks, and stealing private keys that allow fraudulent blockchain transactions to be initiated.

Users are tricked into downloading the TraderTraitor Trojan applications. This is an electronic-based, cross-platform utility developed with JavaScript and the Node.js runtime environment.

TraderTraitor cryptocurrency apps used in these campaigns include DAFOM, TokenAIS, CryptoAIS, AlticGO, Esilet and CreAI Deck.

The Sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Microsoft’s AI success may spell defeat for it’s climate goals

Microsoft's ambitious strides in AI technology are now posing a significant challenge to its own climate goals, as...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways