Hackers are using a novel technique that abuses extended attributes for macOS files to deliver a new trojan that researchers ...
BlueNoroff, the infamous North Korean hacker group responsible for a string of phishing and cybersecurity attacks since 2019, ...
North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS ...
North Korean hackers deploy Flutter-based malware targeting Apple macOS, evading detection in cryptocurrency attacks.
BlueNoroff seen targeting crypto businesses with new piece of malware The malware establishes persistence and opens up a back ...
Hackers associated with North Korea have installed disguised malware in Apple macOS systems by reportedly using Google's ...
North Korean hackers are now using phishing emails instead of their previous tactic of social media grooming, a research firm ...
North Korean cryptocurrency thieves caught targeting macOS with fake PDF applications, backdoors and new persistence tactics.
A new campaign by North Korean hackers, known as 'Hidden Risk,' targets crypto firms with malware disguised as legitimate ...
BlueNoroff hackers exploit macOS with malware hidden in decoy PDFs to steal crypto keys. North Korean cyberattacks target Bitcoin ETF issuers and crypto firms, prompting FBI warnings. A new rise in ...
SentinelLabs observed the North Korean group BlueNoroff targeting crypto firms via a multi-stage malware campaign which utilizes a novel persistence mechanism ...
Initially, attackers attempt to gain access via phishing emails. They lure users into clicking a malicious link, which leads to a PDF document relating to crypto topics, such as “Hidden Risk Behind ...