Home North Korea hackers launch assault on crypto businesses

North Korea hackers launch assault on crypto businesses

TLDR

  • North Korean hackers target cryptocurrency using vulnerabilities in Apple’s macOS.
  • Hackers bypass security by using falsified Apple Developer IDs and fake PDF files.
  • Experts advise crypto users to be vigilant against suspicious links and downloads.

A new report from Sentinel Labs has uncovered a new North Korean hacking attempt on cryptocurrency and related businesses. With the industry rising to nearly $1.5 trillion in value, it’s becoming an ever larger target for hackers worldwide.

The latest scam follows from previous attacks from North Korea, except this time it involves taking advantage of vulnerabilities in Apple’s macOS.

While the Mac operating system is fairly secure for the most part, the hackers have worked their way around the locked-down OS through technical loopholes.

A major method of getting onto people’s machines is by downloading falsified signed software.

Apple requires that all Mac software is verified under the Apple Developer ID. “Avantis Regtech Private Limited (2S8XHJ7948)” was the one being used, which the Cupertino company has since shut down.

This tactic is similar to last year’s ‘RustBucket’, a multi-staged attack that utilizes the fake piece of software method. Once clicked, it downloads and runs various scripts to begin the multifaceted hack, including displaying a false PDF to the user.

DPRK-based hackers are now using similar methods. The latest hack includes sending a PDF of a paper about hidden risks in Bitcoin.

This is based on a genuine paper, but the website will also begin the domino-like effect of serving the unsuspecting user an application under the same name.

sentinel labs screenshot showing fake pdf (left) and real (right)
Fake PDF (left) and original file (right) Source: Sentinel Labs

The software then opens a downloaded PDF while it gets to work. Payloads with a script to alter macOS security about incoming and outgoing connections are then deployed, as well as manipulating the terminal environment itself.

This is usually hidden from the users’ view, but once altered it can allow the hackers to avoid Apple’s detection software.

Researchers monitoring these types of attacks have said that it has been active for at least the last year. This has included spam calls to those targeted in India.

With consistent hacks stemming from North Korea, it’s best to stay vigilant if you’re within the cryptocurrency space and don’t click any old links you see in your email.

Featured image: Pexels (MEHRAX), Wikimedia Commons

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Joel Loynds
Tech Journalist

Joel Loynd’s obsession with uncovering bad games and even worse hardware so you don’t have to has led him on this path. Since the age of six, he’s been poking at awful games and oddities from his ever-expanding Steam library. He’s been writing about video games since 2008, writing for sites such as WePC and PC Guide, as well as covering gaming for Scan Computers, More recently Joel was Dexerto’s E-Commerce and Deputy Tech Editor, delving deep into the exploding handheld market and covering the weird and wonderful world of the latest tech.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.