Article Details
Scrape Timestamp (UTC): 2023-11-07 13:58:26.386
Source: https://thehackernews.com/2023/11/n-korean-bluenoroff-blamed-for-hacking.html
Original Article Text
Click to Toggle View
N. Korean BlueNoroff Blamed for Hacking macOS Machines with ObjCShellz Malware. The North Korea-linked nation-state group called BlueNoroff has been attributed to a previously undocumented macOS malware strain dubbed ObjCShellz. Jamf Threat Labs, which disclosed details of the malware, said it's used as part of the RustBucket malware campaign, which came to light earlier this year. "Based on previous attacks performed by BlueNoroff, we suspect that this malware was a late stage within a multi-stage malware delivered via social engineering," security researcher Ferdous Saljooki said in a report shared with The Hacker News. BlueNoroff, also tracked under the names APT38, Nickel Gladstone, Sapphire Sleet, Stardust Chollima, and TA444, is a subordinate element of the infamous Lazarus Group that specializes in financial crime, targeting banks and the crypto sector as a way to evade sanctions and generate illicit profits for the regime. The development arrives days after Elastic Security Labs disclosed the Lazarus Group's use of a new macOS malware called KANDYKORN to target blockchain engineers. Also linked to the threat actor is a macOS malware referred to as RustBucket, an AppleScript-based backdoor that's designed to retrieve a second-stage payload from an attacker-controlled server. In these attacks, prospective targets are lured under the pretext of offering them investment advice or a job, only to kick-start the infection chain by means of a decoy document. ObjCShellz, as the name suggests, is written in Objective-C that functions as a "very simple remote shell that executes shell commands sent from the attacker server." The exact initial access vector for the attack is currently not known, although it's suspected that the malware is delivered as a post-exploitation payload to manually run commands on the hacked machine. "Although fairly simple, this malware is still very functional and will help attackers carry out their objectives," Saljooki said. The disclosure also comes as North Korea-sponsored groups like Lazarus are evolving and reorganizing to share tools and tactics among each other, blurring the boundaries, even as they continue to build bespoke malware for Linux and macOS. "It is believed the actors behind [the 3CX and JumpCloud] campaigns are developing and sharing a variety of toolsets and that further macOS malware campaigns are inevitable," SentinelOne security researcher Phil Stokes said last month.
Daily Brief Summary
The North Korea-affiliated group, BlueNoroff, has reportedly been responsible for a new macOS malware strain called ObjCShellz. This has been discovered as part of the RustBucket malware campaign.
BlueNoroff, which is known under names such as APT38, Nickel Gladstone, Sapphire Sleet, Stardust Chollima and TA444, is associated with the infamous Lazarus Group and is known for its focus on financial crime, specifically targeting banks and the crypto sector.
The ObjCShellz malware is written in Objective-C and functions as a simple remote shell, executing commands sent from an attacker server. The exact method of initial access for the attack remains unknown, though it's speculated it may be delivered as a post-exploitation payload.
This development of malware comes in the wake of similar discoveries, such as a new macOS malware called KANDYKORN used by the Lazarus Group to target blockchain engineers, and the RustBucket macOS malware, an AppleScript-based backdoor.
The findings highlight the evolving nature of North Korea-sponsored groups, who continue to create bespoke malware for macOS and Linux platforms, and suggests the increase of macOS malware campaigns in the future.