North Korean hackers use signed macOS malware to target IT job seekers

Discussion in 'all things Mac' started by 1PW, Aug 18, 2022.

  1. 1PW

    1PW Registered Member

    Joined:
    Apr 2, 2010
    Posts:
    2,313
    Location:
    .
    https://www.bleepingcomputer.com/ne...igned-macos-malware-to-target-it-job-seekers/
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Wow, this is proof that macOS is getting targeted more and more, and this also seems to be quite a sneaky attack. On the other hand, a good firewall would have blocked the outgoing communication. And of course I assume that most AV's would have caught the malware.
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Last edited: Sep 30, 2022
  4. XIII

    XIII Registered Member

    Joined:
    Jan 12, 2009
    Posts:
    1,423
    For this? Really?

     
  5. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
    +1

    Even with only a modicum of common sense, most people should not be falling for these phishing and social media tricks.
     
  6. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    First line of defence = Common sense
     
  7. plat

    plat Registered Member

    Joined:
    Dec 19, 2018
    Posts:
    2,233
    Location:
    Brooklyn, NY
    Unfortunately, that Uber employee in that Lapsu$s hack was socially engineered. So, if it still produces fruit, the hackers are gonna milk it. People with both smarts and money don't seem to be as commonplace as we would hope.

    I could make a political statement here but I somewhat value my membership to Wilders, so anyway. :cautious:
     
  8. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
    Agreed.

    Where I work my employer requires its employees to take scheduled online courses on how to recognize and avoid these and similar types of scams. They occasionally send "trick" phishing emails to its employees, and anyone falling for them, clicking a harmless link or attachment, is required to take the relevant security course again. Maybe more businesses need to implement this type of education.
     
  9. imdb

    imdb Registered Member

    Joined:
    Nov 2, 2011
    Posts:
    4,208
    that's a pretty wise strategy. :thumb:
     
  10. plat

    plat Registered Member

    Joined:
    Dec 19, 2018
    Posts:
    2,233
    Location:
    Brooklyn, NY
    You would think this would/should be the norm! This is how it should be done. However, this is an investment of your company; it costs money. Too many firms do not make this kind of expenditure, only after the fact--some of them.

    A recent ransomware encryption notice (Royal ransomware) finally acknowledged the lapse of judgement by tauntingly writing ..."you decided to save some money on your security infrastructure..." This was posted over at MT so maybe you saw it. Hopefully most critical-needs corporations (hospitals, utilities) start following the leads of security policies like your company's--particularly now, with a war with escalating threats going on.
     
  11. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    They shouldn't, but don't forget that 99% of all people aren't as computer security savvy as most of us on this forum. And also keep in mind that many people might believe that malware can't easily run on macOS, so if they trust certain persons, why wouldn't they run a ''harmless'' PDF file send by email? And the problem is that in these targeted attacks, built-in security like Gatekeeper and XProtect are often bypassed.
     
  12. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Exactly! In fact, probably all of the latest hacks on Cisco, Microsoft, Twilio and Okta were also based on social engineering, and the employees that got tricked probably thought that MFA authentication apps on their smartphones would save them, but they were wrong. So you would be surprised how many people get tricked into running malware and filling in credentials on hacker controlled sites.

    Apparently this is big business because I read that KnowBe4 is being bought for $4 billion, and all they do is providing security awareness training. I personally would focus more on making better security tools, because people will keep making mistakes. But KnowBe4 has a revenue of about $330 million, not too bad.

    https://www.knowbe4.com
     
    Last edited: Oct 1, 2022
  13. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
    I agree that depending primarily on employee's security awareness to keep the company's assetts safe is foolhardy, and that their own security measurements such as hardware and software based has to be the primary safety net against malware attacks. However, educating employees about security awareness does help in reducing the number of potential expoits they would have to deal with, since it means fewer employees falling for phishing and other social media type attacks within the organization.

    An example of their hardware security is the COE devices they issue are thoroughly locked down in every way imaginable including, and I'm not really sure how it's done, probably a script I guess, but the devices are scanned for application and hardware compliancy every time they are booted up. No one except those authorized are granted any kind of Administrative rights, and applications can be installed only from it's own validated software repository.
     
  14. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Oh for sure it helps, so I'm all for more training. But I'm even more for better security tools related to blocking malware and blocking MFA bypasses. As for this specific attack on macOS, you could probably neutralize it by blocking outbound communications and blocking child process spawning by the fake PDF reader. Which would normally be done by a behavior blocker. That is if Gatekeeper and XProtect failed to spot this attack of course.
     
  15. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    It's not really major news, but Apple has now finally admitted that old macOS machines are at risk of being hacked by unpatched zero days. That is if Apple's built-in protection like XProtect and Gatekeeper are bypassed of course.

    https://arstechnica.com/gadgets/202...olicy-only-the-latest-oses-are-fully-patched/
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.