/ Security Bit: Malicious code exploits the surge in the cryptocurrency market to make money.

Security Bit: Malicious code exploits the surge in the cryptocurrency market to make money.

2024. 12. 17. 오전 12:17:23
Mosyle, Apple의 통합 플랫폼,은 기업용으로 Apple 기기의 보안과 사용성을 향상시키는 데 초점을 맞추고 있습니다. Mosyle은 자동화된 보안 및 준수, Next Generation EDR, AI 기반의 Zero Trust, 그리고 최신 Apple MDM 솔루션을 통해 기업이 저렴한 비용으로 수백만 개의 Apple 기기를 사용할 수 있도록 지원하고 있습니다. Realst, 최근에 Mac에 대상으로한 랜섬웨어,는 이전에는 비트코인 지갑에서 코인을 훔치는 도구로 사용되었으나, 이제는 웹3 개발자를 대상으로한 공격으로 변모했습니다. 공격자는 Telegram, X 등의 소셜 플랫폼을 통해 가짜 일자리를 통해 피해자를 유인하고 있습니다. 피해자가 가상 미팅 앱을 설치해야 하는 것은 이전의 스팸 기술과는 다르게, 개인 정보를 요청하지 않습니다. Realst는 브라우저 쿠키, 자격 증명서, 암호화된 지갑 등의 민감한 데이터를 빠르게 탐색하고 탈취하려고 합니다.
Here is the complete translated result without duplicate or untranslated content, maintaining the HTML structure:
Security Bit: Malicious code exploits the surge in the cryptocurrency market to make money.

Mosyle is the only Apple integration platform. Our goal is to enhance the usability of Apple devices and make them secure for business use. We combine a unique integrated approach to security with the latest Apple-specific security solutions, including automated security and compliance, Next Generation EDR, AI-based Zero Trust, and a proprietary access management system that is the strongest and most modern Apple MDM in the market. As a result, Mosyle makes it easy for over 45,000 organizations to use millions of Apple devices at a low cost. Request an EXTENDED TRIAL today and learn about everything Mosyle can do for you.

The real ransomware, Realst, has returned to attack Macs. The malicious code first appeared this year as a tool to steal cryptocurrency from wallets and to steal other credentials. At the time, I reported that it was initially spread through a fake blockchain game. However, it now appears to be a targeted phishing campaign aimed at web3 developers.

Security Bit: Malicious code exploits the surge in the cryptocurrency market to make money.

According to a report by Cado Security, cybercriminals are luring victims through fake jobs on social platforms like Telegram and X. This technique is not new. Remember that a joke was made last year about phishing scams that focused on impersonating well-known companies and recruiting fake jobs on LinkedIn.

The main difference in this attack is that it requires victims to download a virtual meeting app instead of requesting personal information such as a social security number or bank account number. Once installed, Realst tries to quickly exploit sensitive data like browser cookies, credentials, and encrypted wallets. Many victims do not realize this process.

The surprising thing is that some fake sites include hidden JavaScript that can steal the encrypted wallet stored in the victim's browser before downloading the malicious code.

Cado Security revealed that the attacker is using AI-generated websites to evade detection and employs a rapid rotation strategy by using multiple domains. This rapid rotation strategy showcases the quality of their technology by using AI-generated content on fake company blogs and social profiles.

When a user downloads a 'meeting tool', the Realst malware activates and searches for and exfiltrates the following information:

  • Telegram credentials
  • Bank card information
  • Keychain credentials
  • Browser cookies and autocomplete credentials for Google Chrome, Opera, Brave, Edge, and Arc. Safari is not mentioned.
  • Wallet
  • Trezor wallet
Malicious website containing Realst malware for both MacOS and Windows.

To ensure safety, avoid downloading from unverified sources, enable multi-factor authentication, do not store cryptocurrency credentials in the browser, and use a trusted video app (e.g., Zoom) when setting up meetings. Always be cautious when accessing business opportunities through Telegram and other social apps. Always verify the authenticity of an account and be cautious when clicking links.

You can find Cado Security's full report here.

More about Apple Security

  • Recently released apps now allow regular scanning of iPhones for Periscope spyware with a single dollar fee per month. This spyware can access almost all mobile phone data.
  • Context-dependent HTML tag removal and translation result:
  • Apple's password app now has a Firefox extension for Mac. Interestingly, this extension appears to have been created by a third-party developer, but Apple has taken it over using its brand and name.
  • Mosyle has exclusively published details about the new Mac malware loader family. Mosyle's security research team discovered that these new threats were written in unconventional programming languages and used various secret techniques to evade detection.

Follow us: Twitter/X, LinkedIn, Threads