Advertise
CoinTrust
BTC
ETH
BCH
SOL
DOGE
SHIB
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos
No Result
View All Result
CoinTrust
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos
No Result
View All Result
CoinTrust
No Result
View All Result

Home » macOS Malware Exploits Blockchain Engineers: Analysis Reveals Insights

macOS Malware Exploits Blockchain Engineers: Analysis Reveals Insights

Kelly Cromley by Kelly Cromley
Nov 2, 2023
in Market News, News
Reading Time: 3 mins read
0

The landscape of cybersecurity vulnerabilities affecting macOS systems is ever-evolving, prompting Apple to continually release security updates to address these susceptibilities. While macOS is generally perceived as more secure compared to some other operating systems, it is not impervious to exploitation, and hackers are quick to exploit new vulnerabilities as they emerge.

 

Recently, cybersecurity researchers at Elastic Security Labs have detected active hacker activity aimed at blockchain engineers associated with a cryptocurrency exchange platform. These hackers are employing a new macOS malware to breach their targets. The attack utilizes a combination of custom and open-source tools for initial access and post-exploitation activities.

A Closer Look at REF7001: The New macOS Malware

The discovery of this malware occurred during the analysis of a macOS endpoint. It was brought to light when a Python application disguised as a crypto bot was delivered to a victim via a direct message on Discord, a popular communication platform.

 

This cyber activity is believed to be linked to the Democratic People’s Republic of Korea (DPRK) and exhibits similarities to the tactics of the Lazarus Group, a notorious hacking collective. In response to these findings, security analysts have labeled this campaign as REF7001, considering various elements such as techniques, infrastructure, certificates, and detection rules.

Identifying Hackers and Their Tactics in Targeting Crypto Exchanges

The hackers behind this campaign adopted a deceptive approach, posing as members of the blockchain community on a public Discord channel. They succeeded in tricking an unsuspecting individual into downloading a ZIP file that was, in reality, a malicious payload. The victim, under the impression that they were downloading a crypto arbitrage bot, inadvertently initiated the initial compromise.

 

This marked the commencement of the REF7001 malware campaign, which progressed through multiple stages:

 

Stage 0 (Initial Compromise) – Watcher.py

In this stage, the malware named Watcher.py was responsible for the initial compromise.

 

Stage 1 (Dropper) – testSpeed.py and FinderTools

The second stage introduced testSpeed.py and FinderTools, which played the role of a dropper.

 

Stage 2 (Payload) – .sld and .log – SUGARLOADER

Stage 2 introduced the payload, comprising files with the .sld and .log extensions, referred to as SUGARLOADER.

 

Stage 3 (Loader)- Discord (fake) – HLOADER

This stage involved a loader, specifically a Discord (fake) loader labeled as HLOADER.

 

Stage 4 (Payload) – KANDYKORN

The final stage, Stage 4, introduced KANDYKORN, which represents the ultimate payload of the malware campaign.

 

Both Stage 3 and Stage 4 of the malware execution share the use of an encrypted RC4 protocol for communication with the command and control (C2) server, utilizing a consistent encryption key. The malware samples employ encryption to safeguard data during transmission, decrypting it before processing.

 

During the initialization process, a handshake occurs between the malware and the C2 server. If the handshake fails, the attack is halted.

 

The communication between the client and the C2 server is a structured process. The client sends a random number to the C2 server, which responds with a nonce. Subsequently, the client computes a challenge and sends it to the server. After the connection is established, the client provides its ID and awaits commands from the server. All data exchanged between the client and the server adheres to a consistent serialization pattern, consisting of length, payload, and a return code to track errors.

 

The distribution of the initial malware archive involved the hackers sharing a Google Drive link within a blockchain Discord server. This served as a gateway for unsuspecting victims to unknowingly download the malicious payload.

 

The analysis of REF7001 also revealed the presence of two C2 servers utilized by the attackers:

 

tp-globa[.]xyz//OdhLca1mLUp/lZ5rZPxWsh/7yZKYQI43S/fP7savDX6c/bfC

23.254.226[.]90

The modus operandi of this campaign aligns with the tactics employed by the DPRK’s Lazarus Group, which targets cryptocurrency-related companies in pursuit of stolen coins to evade international sanctions. These threat actors entice blockchain engineers on chat servers with the promise of financial gain, only to infect them when they engage with the malicious payloads. The REF7001 campaign underscores the persistent and evolving threat landscape in the world of cryptocurrency and blockchain technology. Security measures must continuously adapt to thwart such attacks and protect valuable assets.

 

In conclusion, the detection and analysis of REF7001 highlight the importance of robust security measures and vigilance within the cryptocurrency and blockchain communities, as malicious actors constantly seek new avenues for exploitation. It is imperative for organizations and individuals operating in these domains to remain informed and take proactive steps to safeguard their digital assets and data.

Previous Post

OneSpan Introduces Trust Vault to Safeguard Digital Agreement Provenance

Next Post

Shiba Inu Unveils SHIB Name Service (SNS) to Simplify Digital Identities

Related Posts

The Graph

The Graph Adopts Chainlink CCIP to Boost Cross-Chain GRT Utility

by Kelly Cromley
Nov 6, 2025
0

The Graph has announced plans to integrate Chainlink’s Cross-Chain Interoperability Protocol (CCIP) in an effort to enable secure transfers of...

chainlink partners with sbi digital markets

Chainlink Partners with SBI to Advance Cross-Chain Finance

by Kelly Cromley
Nov 6, 2025
0

Chainlink has formed an exclusive partnership with SBI Digital Markets, the digital asset arm of Japan’s SBI Group, in a...

CaneToadium-WLCP

New Solana-Based Token Targets Transparent Wildlife Funding

by Kelly Cromley
Nov 6, 2025
0

The CaneToadium-WLCP Wildlife and Conservation Project has unveiled a blockchain-powered endowment structure supported by its native digital asset, CaneToad Coin,...

alternative funding group

AltFunding.com Embraces Crypto to Redefine Business Lending

by Kelly Cromley
Nov 6, 2025
0

Alternative Funding Group, the merchant cash advance lender operating under AltFunding.com, has revealed that it has started accepting cryptocurrency payments...

Landbitt

Landbitt Launches India’s First Blockchain Platform for Fractional Land Ownership

by Kelly Cromley
Nov 6, 2025
0

Landbitt Private Limited has introduced what it claims to be India’s first blockchain-backed platform for real estate tokenization and fractional...

ripple decentralized ledger

Ripple, Mastercard and Gemini Launch Stablecoin-Based Card Settlement

by Kelly Cromley
Nov 6, 2025
0

Ripple has confirmed a collaboration with Mastercard, Gemini, and WebBank to enable settlement of traditional fiat card payments using Ripple’s...

Next Post
Shiba Inu Unveils SHIB Name Service (SNS) to Simplify Digital Identities

Shiba Inu Unveils SHIB Name Service (SNS) to Simplify Digital Identities

  • Collé Ai

    Collé: Pioneering AI Web3 Platform Receives Investment Boost from BlackRock

    by Kelly Cromley
    May 13, 2024
  • Router Protocol and OpenWorldSwap Partnership to Revolutionize DEX Market

    by Kelly Cromley
    Aug 6, 2024
  • Hyper Foundation Launched to Boost Hyperliquid Blockchain Development

    by Kelly Cromley
    Oct 15, 2024
  • Blockchain Based Sports Platform SportsMint Unveiled

    by Kelly Cromley
    Apr 30, 2024
  • Central Bank of Saudi Arabia Teams Up with Ripple to Transform Cross-Border Settlements

    by Kelly Cromley
    Aug 17, 2023

Recent News

The Graph
Market News

The Graph Adopts Chainlink CCIP to Boost Cross-Chain GRT Utility

by Kelly Cromley
Nov 6, 2025
chainlink partners with sbi digital markets
Market News

Chainlink Partners with SBI to Advance Cross-Chain Finance

by Kelly Cromley
Nov 6, 2025
CaneToadium-WLCP
Market News

New Solana-Based Token Targets Transparent Wildlife Funding

by Kelly Cromley
Nov 6, 2025
alternative funding group
Market News

AltFunding.com Embraces Crypto to Redefine Business Lending

by Kelly Cromley
Nov 6, 2025
Landbitt
Market News

Landbitt Launches India’s First Blockchain Platform for Fractional Land Ownership

by Kelly Cromley
Nov 6, 2025

Categories

  • Altcoin News
  • Analysis News
  • Binance Coin News
  • Bitcoin News
  • Blog
  • Cardano News
  • Ethereum News
  • ICO News
  • Legislation News
  • Market Forecasts
  • Market News
  • News
  • Ripple News
  • Solana News
  • Tether News
  • XRP
Trustpilot

Cointrust

  • About Us
  • Contact Us
  • Correction Request
  • Our Team

Legal

  • Disclaimer
  • Terms & Conditions
  • Privacy Policy
  • Cookie Policy

Popular

  • ICO Listings
  • Knowledge Base
  • All about Mining
  • Cryptocurrency Exchanges
  • How and Where to buy Cryptocurrency

Sitemap

  • News section
  • Sitemap
  • XML Sitemap

© 2024 CoinTrust.com.

CoinTrustCoinTrust

* DISCLAIMER: All information provided in CoinTrust is merely for informational purposes, we are not an investment advisor and not affiliated with any companies or ICO/Cryptocurrency Projects. To use this website you must accept our cookie policy, Disclaimer and Privacy Policies.

No Result
View All Result
  • News
  • Bitcoin
  • Ethereum
  • Altcoin
  • Market Cap
  • Learn
    • Buying Crypto
    • Crypto Mining
    • Crypto Exchanges
    • Knowledge
  • Crypto Casinos
    • Bitcoin Casinos
    • New Crypto Casinos
    • No KYC Crypto Casinos
    • Anonymous Crypto Casinos
    • VPN Friendly Crypto Casinos
    • Bitcoin Poker
    • Crypto Poker
    • Bitcoin Bingo
    • USDT Casinos
    • Offshore Online Casinos
    • Bitcoin Betting Sites
    • Crypto Sports Betting
    • Reddit’s Best Bitcoin and Crypto Casinos

© 2024 CoinTrust.com.

We use cookies to ensure that we give you the best experience on our website.
If you continue to use this site you agree to allow us to use cookies, in accordance with our Cookie Policy.