Home > Cyber News > KANDYKORN: macOS Targeted by New Advanced Malware
CYBER NEWS

KANDYKORN: macOS Targeted by New Advanced Malware

In a recent cybersecurity revelation, state-sponsored threat actors hailing from the Democratic People’s Republic of Korea (DPRK) have been identified targeting blockchain engineers associated with an undisclosed crypto exchange platform.

Lazarus Group’s Mac Malware Evolution

The assailants, linked to the notorious Lazarus Group, deployed a sophisticated macOS malware named KANDYKORN, showcasing a new level of cyber threat sophistication.
KANDYKORN- macOS Targeted by New Advanced Malware
The attackers, showcasing a strategic shift, infiltrated their targets through a public Discord server, impersonating blockchain engineers. Employing social engineering tactics, victims were enticed into downloading and executing a seemingly innocuous ZIP archive, concealing the malicious payload.

Security researchers Ricardo Ungureanu, Seth Goodwin, and Andrew Pease detailed the attack’s complexity, revealing that the threat actors enticed victims with a Python application, ultimately breaching the environment through multiple intricate stages, each employing deliberate defense evasion techniques.

This isn’t the Lazarus Group’s first foray into macOS malware. A previous attack involved a backdoored PDF application, leading to the deployment of RustBucket, an AppleScript-based backdoor. The new campaign, however, sets itself apart by blending technical sophistication with an innovative social engineering approach.




KANDYKORN Malware Unveiled

Described as an advanced implant, KANDYKORN boasts a range of capabilities, including monitoring, interaction, and detection avoidance. Utilizing reflective loading, a direct-memory execution form, it adeptly sidesteps traditional detection methods, contributing to its elusive nature.

The malware’s delivery involves a multi-stage process, initiated by a Python script, “watcher.py,” which retrieves subsequent scripts from Google Drive. The final payload, KANDYKORN, is executed in memory, showcasing a level of sophistication that challenges conventional cybersecurity measures.

The researchers emphasize that the DPRK, particularly through units like the Lazarus Group, remains committed to targeting the crypto industry. Their primary objective is to pilfer cryptocurrencies, circumventing international sanctions that hinder their economic growth and ambitions.

Conclusion

As cyber threats evolve, the intersection of state-sponsored actors, advanced malware, and social engineering presents a formidable challenge for the cybersecurity community. The KANDYKORN revelation underscores the need for constant vigilance, adaptive defense mechanisms, and international collaboration to safeguard against the ever-growing sophistication of malicious actors in the digital realm.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree