In recent developments concerning cybersecurity, the North Korean hacking group Kimsuky has been linked to the deployment of a new malware strain named 'forceCopy.' This malware is designed to target browser-stored credentials and is disseminated through spear-phishing emails that trick victims into opening disguised Windows shortcut files. The malware download is triggered via PowerShell and mshta.exe, leading to deeper system infiltration. Additionally, another malware called 'FlexibleFerret' has been discovered, targeting MacOS systems as part of a broader campaign that has been active since November 2023 and currently evades Apple's XProtect detection. The ongoing threat landscape also includes the use of fake Google Chrome sites to distribute 'ValleyRAT' malware via DLL hijacking. These developments highlight the evolving tactics employed by cybercriminals, particularly in targeting educational institutions and exploiting insider threats through credential theft and ransomware attacks.
A newly discovered malware strain has been identified that’s been used as part of the ongoing North Korean Contagious Interview campaign, in which threat actors lure victims to install malware through the job interview process. #cybersecurity #infosec https://t.co/9EPpraQEzm
Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking: https://t.co/USCtGDdbEL by The Hacker News #infosec #cybersecurity #technology #news
🚨 New DPRK malware "FlexibleFerret" targeting MacOS discovered. It's part of broader campaign that's been active since Nov 2023. Currently evading Apple's XProtect detection. Here's what we know 👇