The Lazarus group, a North Korean hacking organization previously linked to criminal activity, has been connected to a new attack scheme to breach systems and steal cryptocurrency from third parties. The campaign, which uses a modified version of an already existing malware product called Applejeus, uses a crypto site and even documents to gain access to systems.Volexity, a Washington D.C.-based cybersecurity firm, has linked Lazarus, a North Korean hacking group already sanctioned by the U.S.
The same strategy has been used by Lazarus before. However, this new scheme uses a technique that allows the application to “confuse and slow down” malware detection tasks.Volexity also found that the technique to deliver this malware to final users changed in October. The method morphed to use Office documents, specifically a spreadsheet containing macros, a sort of program embedded in the documents designed to install the Applejeus malware in the computer.
The document, identified with the name “OKX Binance & Huobi VIP fee comparision.xls,” displays the benefits that each one of the VIP programs of these exchanges supposedly offers at their different levels. To mitigate this kind of attack, it is recommended to block the execution of macros in documents, and also scrutinize and monitor the creation of new tasks in the OS to be aware of new unidentified tasks running in the background.
I feel safe on 1inch Network. There is a RabbitHole function, which is aimed at protecting MetaMask users from sandwich attacks. And here your data is always confidential.
AIRDROP
AIRDROP
NICE
AIRDROP
NICE
BNB
BNB
BNB
NICE
NICE
BNB
FACT
BNB
GIVE
TAKE
BNB
FACT
FACT
BNB
FACT
NICE
GIVE
BNB
BNB
NICE
NICE
AIRDROP
GIVE
FACT
BNB
FACT
BNB
AIRDROP
FACT
BNB
TAKE
GIVE
BNB
FACT
AIRDROP
AIRDROP
TAKE
AIRDROP
BNB
TAKE
AIRDROP
BNB
NICE
AIRDROP
TAKE
NICE
FACT