DPRK Hackers Tweak Malware to Lure MacOS Users into Video Calls

Share This Post

Well known for targeting victims with fake job postings, North Korea state-sponsored hackers have been discovered using a new variant of their BeaverTail malware to trick macOS users into downloading a malicious version of Microtalk, a video-calling service.

Details about the latest campaign were published by cybersecurity researcher Patrick Wardle, who explained in his writeup that the threat actors likely lured their victims into downloading the updated BeaverTail-infected version of Microtalk by asking them to join a job interview.

“Yes, even the cloned site states that you can ‘start your next video call with a single click. No download … is required,’ but I guess, who reads the fine print?” Wardle wrote.

In addition to stealing data from the victim’s device, BeaverTail also executes additional payloads, including InvisibleFerret, the report added.

The North Korean hackers are a wily bunch and are quite adept at hacking macOS targets, even though their technique[s] often rely on social engineering (and thus from a technical point of view are rather unimpressive),” Wardle said.

https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt213d1ff93047905a/66980ecfa7360d6865fc4330/DPRK_hack_Mykhailo_Polenok_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.