Home » North Korean crypto thieves deploy custom Mac backdoor

North Korean crypto thieves deploy custom Mac backdoor

by Wikdaily
0 comments
Hacker in a dark hoody sitting in front of a notebook with digital north korean flag and binary streams background cybersecurity concept


Fake Zoom meeting invitations used as lure

The recent attack campaigns against crypto and Web3 companies started in April and were previously documented by Huntabil.IT and Huntress, who attributed the attacks to a North Korean subgroup that dates back to at least 2017 and is tracked in the security industry under different names: TA444, BlueNoroff, Sapphire Sleet, Copernicium, Stardust Chollima, or CageyChameleon.

The victims received messages on Telegram from impersonated contacts they knew and trusted, who invited them to schedule a meeting via Calendly, an appointment scheduling service. Subsequently they received a fake email with an invitation to a Zoom meeting, as well as instructions to run a “Zoom SDK update script.”

This script, called zoom_sdk_support.scpt, is written in AppleScript, a language developed by Apple for controlling macOS applications. This first-stage script is padded with 10,000 lines of white space to make it hard to read the malicious code, but its purpose is to download a second-stage script from another attacker-controlled domain that contains the word zoom. This second-stage script downloads an HTML script that redirects the user to a real Zoom meeting link as a distraction from the attack chain executing in the background.

You may also like

Leave a Comment

Welcome to WikDaily, your trusted source for the latest news, trends, and insights across the globe. We are a dynamic blog-style news platform committed to delivering fast, accurate, and engaging content across a variety of topics—from breaking headlines to deep dives into tech, business, entertainment, travel, sports, and more.

Edtior's Picks

Latest Articles