Advertise
CoinTrust
BTC
ETH
BCH
SOL
DOGE
SHIB
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos
No Result
View All Result
CoinTrust
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos
No Result
View All Result
CoinTrust
No Result
View All Result

Home » macOS Malware Exploits Blockchain Engineers: Analysis Reveals Insights

macOS Malware Exploits Blockchain Engineers: Analysis Reveals Insights

Kelly Cromley by Kelly Cromley
Nov 2, 2023
in Market News, News
Reading Time: 3 mins read
0

The landscape of cybersecurity vulnerabilities affecting macOS systems is ever-evolving, prompting Apple to continually release security updates to address these susceptibilities. While macOS is generally perceived as more secure compared to some other operating systems, it is not impervious to exploitation, and hackers are quick to exploit new vulnerabilities as they emerge.

 

Recently, cybersecurity researchers at Elastic Security Labs have detected active hacker activity aimed at blockchain engineers associated with a cryptocurrency exchange platform. These hackers are employing a new macOS malware to breach their targets. The attack utilizes a combination of custom and open-source tools for initial access and post-exploitation activities.

A Closer Look at REF7001: The New macOS Malware

The discovery of this malware occurred during the analysis of a macOS endpoint. It was brought to light when a Python application disguised as a crypto bot was delivered to a victim via a direct message on Discord, a popular communication platform.

 

This cyber activity is believed to be linked to the Democratic People’s Republic of Korea (DPRK) and exhibits similarities to the tactics of the Lazarus Group, a notorious hacking collective. In response to these findings, security analysts have labeled this campaign as REF7001, considering various elements such as techniques, infrastructure, certificates, and detection rules.

Identifying Hackers and Their Tactics in Targeting Crypto Exchanges

The hackers behind this campaign adopted a deceptive approach, posing as members of the blockchain community on a public Discord channel. They succeeded in tricking an unsuspecting individual into downloading a ZIP file that was, in reality, a malicious payload. The victim, under the impression that they were downloading a crypto arbitrage bot, inadvertently initiated the initial compromise.

 

This marked the commencement of the REF7001 malware campaign, which progressed through multiple stages:

 

Stage 0 (Initial Compromise) – Watcher.py

In this stage, the malware named Watcher.py was responsible for the initial compromise.

 

Stage 1 (Dropper) – testSpeed.py and FinderTools

The second stage introduced testSpeed.py and FinderTools, which played the role of a dropper.

 

Stage 2 (Payload) – .sld and .log – SUGARLOADER

Stage 2 introduced the payload, comprising files with the .sld and .log extensions, referred to as SUGARLOADER.

 

Stage 3 (Loader)- Discord (fake) – HLOADER

This stage involved a loader, specifically a Discord (fake) loader labeled as HLOADER.

 

Stage 4 (Payload) – KANDYKORN

The final stage, Stage 4, introduced KANDYKORN, which represents the ultimate payload of the malware campaign.

 

Both Stage 3 and Stage 4 of the malware execution share the use of an encrypted RC4 protocol for communication with the command and control (C2) server, utilizing a consistent encryption key. The malware samples employ encryption to safeguard data during transmission, decrypting it before processing.

 

During the initialization process, a handshake occurs between the malware and the C2 server. If the handshake fails, the attack is halted.

 

The communication between the client and the C2 server is a structured process. The client sends a random number to the C2 server, which responds with a nonce. Subsequently, the client computes a challenge and sends it to the server. After the connection is established, the client provides its ID and awaits commands from the server. All data exchanged between the client and the server adheres to a consistent serialization pattern, consisting of length, payload, and a return code to track errors.

 

The distribution of the initial malware archive involved the hackers sharing a Google Drive link within a blockchain Discord server. This served as a gateway for unsuspecting victims to unknowingly download the malicious payload.

 

The analysis of REF7001 also revealed the presence of two C2 servers utilized by the attackers:

 

tp-globa[.]xyz//OdhLca1mLUp/lZ5rZPxWsh/7yZKYQI43S/fP7savDX6c/bfC

23.254.226[.]90

The modus operandi of this campaign aligns with the tactics employed by the DPRK’s Lazarus Group, which targets cryptocurrency-related companies in pursuit of stolen coins to evade international sanctions. These threat actors entice blockchain engineers on chat servers with the promise of financial gain, only to infect them when they engage with the malicious payloads. The REF7001 campaign underscores the persistent and evolving threat landscape in the world of cryptocurrency and blockchain technology. Security measures must continuously adapt to thwart such attacks and protect valuable assets.

 

In conclusion, the detection and analysis of REF7001 highlight the importance of robust security measures and vigilance within the cryptocurrency and blockchain communities, as malicious actors constantly seek new avenues for exploitation. It is imperative for organizations and individuals operating in these domains to remain informed and take proactive steps to safeguard their digital assets and data.

Previous Post

OneSpan Introduces Trust Vault to Safeguard Digital Agreement Provenance

Next Post

Shiba Inu Unveils SHIB Name Service (SNS) to Simplify Digital Identities

Related Posts

India

ICAI and CAG Push for Blockchain-Enabled Autonomous Audits

by Kelly Cromley
Dec 7, 2025
0

The Institute of Chartered Accountants of India (ICAI) and the Office of the Comptroller and Auditor General (CAG) are jointly...

gafin partners with tauntai

GaFin and tauntAI Join Forces to Advance AI-Powered Web3 Gaming

by Kelly Cromley
Dec 7, 2025
0

GaFin, a well-known Web3 GameFi platform, has announced a collaboration with tauntAI, a rising SocialFi ecosystem built on Web3 frameworks....

21dao partners with tilted

21 DAO and Tilted Partner to Build AI-Powered Web3 Ecosystem

by Kelly Cromley
Dec 7, 2025
0

21 DAO, the decentralized organization behind the task-driven economy platform TasKVerse, has announced a new partnership with Tilted, an AI-powered...

kingdomstarter partners with helios

KingdomStarter and Helios Forge Alliance to Advance Blockchain Innovation

by Kelly Cromley
Dec 7, 2025
0

The blockchain sector is witnessing increasing collaboration as platforms seek to overcome fragmentation and improve accessibility. KingdomStarter, a prominent multi-chain...

miro partners with aether network

MIRO–Aether Alliance Targets Faster, Smarter Web3 Payments

by Kelly Cromley
Dec 6, 2025
0

A new strategic collaboration has been announced between Bitcoin-based payment platform MIRO and Aether Network, a modular blockchain project focused...

KRW1

KRW1 Stablecoin Expands to Polygon, Boosting Real-Time Web3 Payments

by Kelly Cromley
Dec 6, 2025
0

South Korean digital asset custodian BDACS has moved its KRW-backed stablecoin, KRW1, into full deployment on the Polygon blockchain, concluding...

Next Post
Shiba Inu Unveils SHIB Name Service (SNS) to Simplify Digital Identities

Shiba Inu Unveils SHIB Name Service (SNS) to Simplify Digital Identities

  • Collé Ai

    Collé: Pioneering AI Web3 Platform Receives Investment Boost from BlackRock

    by Kelly Cromley
    May 13, 2024
  • Router Protocol and OpenWorldSwap Partnership to Revolutionize DEX Market

    by Kelly Cromley
    Aug 6, 2024
  • Hyper Foundation Launched to Boost Hyperliquid Blockchain Development

    by Kelly Cromley
    Oct 15, 2024
  • SmarTrust Brings Blockchain-Powered Escrow to Freelancers

    by Kelly Cromley
    May 1, 2025
  • Blockchain Based Sports Platform SportsMint Unveiled

    by Kelly Cromley
    Apr 30, 2024

Recent News

India
Market News

ICAI and CAG Push for Blockchain-Enabled Autonomous Audits

by Kelly Cromley
Dec 7, 2025
gafin partners with tauntai
Market News

GaFin and tauntAI Join Forces to Advance AI-Powered Web3 Gaming

by Kelly Cromley
Dec 7, 2025
21dao partners with tilted
Market News

21 DAO and Tilted Partner to Build AI-Powered Web3 Ecosystem

by Kelly Cromley
Dec 7, 2025
kingdomstarter partners with helios
Market News

KingdomStarter and Helios Forge Alliance to Advance Blockchain Innovation

by Kelly Cromley
Dec 7, 2025
miro partners with aether network
Bitcoin News

MIRO–Aether Alliance Targets Faster, Smarter Web3 Payments

by Kelly Cromley
Dec 6, 2025

Categories

  • Altcoin News
  • Analysis News
  • Binance Coin News
  • Bitcoin News
  • Blog
  • Cardano News
  • Ethereum News
  • ICO News
  • Legislation News
  • Market Forecasts
  • Market News
  • News
  • Ripple News
  • Solana News
  • Tether News
  • XRP
Trustpilot

Cointrust

  • About Us
  • Contact Us
  • Correction Request
  • Our Team

Legal

  • Disclaimer
  • Terms & Conditions
  • Privacy Policy
  • Cookie Policy

Popular

  • ICO Listings
  • Knowledge Base
  • All about Mining
  • Cryptocurrency Exchanges
  • How and Where to buy Cryptocurrency

Sitemap

  • News section
  • Sitemap
  • XML Sitemap

© 2024 CoinTrust.com.

CoinTrustCoinTrust

* DISCLAIMER: All information provided in CoinTrust is merely for informational purposes, we are not an investment advisor and not affiliated with any companies or ICO/Cryptocurrency Projects. To use this website you must accept our cookie policy, Disclaimer and Privacy Policies.

No Result
View All Result
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos

© 2024 CoinTrust.com.

We use cookies to ensure that we give you the best experience on our website.
If you continue to use this site you agree to allow us to use cookies, in accordance with our Cookie Policy.