Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
North Korean Hacker Drama: Mac Malware Disguised as Video Call App Targets Job Seekers
Cybersecurity researchers have discovered an updated variant of stealer malware linked to North Korea, targeting job seekers through a macOS disk image named MiroTalk.dmg. This malware, BeaverTail, steals data from browsers and crypto wallets, delivering additional payloads like the Python backdoor InvisibleFerret.
Hot Take:
So, North Korean hackers are now moonlighting as job recruiters and macOS aficionados? If only they put this much effort into making a legitimate LinkedIn profile, they might actually get a real job.
Key Points:
– **MiroTalk.dmg** is the latest disguise for the BeaverTail malware, targeting job seekers.
– **InvisibleFerret**, a Python backdoor, is capable of persistent remote access.
– **Bogus npm packages** such as call-blockflow are being used to distribute malware.
– **Phishing attacks by Kimsuky** target Japanese organizations with sophisticated multi-step malware.
– **North Korean hackers** are increasingly adept at social engineering and macOS hacking.