#etherhiding

[ follow ]
Information security
fromThe Hacker News
2 days ago

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

A supply-chain compromise of a legitimate Open VSX developer allowed malicious GlassWorm loader updates to be published, risking macOS credentials and cryptocurrency wallet theft.
fromThe Hacker News
3 months ago

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group is actively refining its toolset. That's according to new findings from Cisco Talos, which said recent campaigns undertaken by the hacking group have seen the functions of BeaverTail and OtterCookie coming closer to each other more than ever, even as the latter has been fitted with a new module for keylogging and taking screenshots.
Information security
#blockchain-malware
Information security
fromThe Hacker News
3 months ago

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

UNC5142 leverages compromised WordPress sites and BNB Smart Chain smart contracts to deliver information-stealing malware to Windows and macOS systems.
fromThe Hacker News
3 months ago

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342, which is also known as CL-STA-0240 (Palo Alto Networks Unit 42), DeceptiveDevelopment (ESET), DEV#POPPER (Securonix), Famous Chollima (CrowdStrike),
Information security
[ Load more ]