U.S. Warns Of Lazarus hackers Using Malicious Crypto Apps

Share post:

A joint report by CISA, the FBI and the U.S. Treasury Department has warned organizations in the crypto and blockchain industry about a new threat posed by the North Korean hacking group Lazarus.

Security agencies found that hackers using trojanized cryptocurrency applications are targeting organizations in these industries.

To carry out the attack, the hackers use social engineering to trick employees of cryptocurrency companies into downloading and running malicious Windows and macOS cryptocurrency apps.

The trojanized tools are then used to carry out various malicious activities, including accessing the target’s computers, spreading malware on their networks, and stealing private keys that allow fraudulent blockchain transactions to be initiated.

Users are tricked into downloading the TraderTraitor Trojan applications. This is an electronic-based, cross-platform utility developed with JavaScript and the Node.js runtime environment.

TraderTraitor cryptocurrency apps used in these campaigns include DAFOM, TokenAIS, CryptoAIS, AlticGO, Esilet and CreAI Deck.

The Sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Microsoft reveals critical security flaw affecting Android apps

Microsoft has identified a serious vulnerability in Android apps that could allow malicious software to hijack legitimate apps...

Chinese government websites “Riddled with security flaws” say researchers

A recent study conducted by researchers from the Harbin Institute of Technology reveals significant security issues plaguing Chinese...

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways