North Korean Hackers Deploy New "Durian" Malware Against South Korean Crypto Firms
Kimsuky hackers utilize "Durian" malware to target South Korean crypto companies, revealing potential links to the notorious Lazarus Group.

Kimsuky hackers utilize "Durian" malware to target South Korean crypto companies, revealing potential links to the notorious Lazarus Group.
Kimsuky, a state-backed North Korean hacking group, has reportedly used a new malware variant to target at least two South Korean cryptocurrency companies.
Kaspersky issues urgent warning on Mac-targeting cryptocurrency malware. Mac users face digital asset theft as hackers replace authentic crypto wallet apps. Heightened security measures crucial in the evolving threat landscape.
EtherHiding is a new technique employed by hackers to infiltrate websites powered by WordPress. Once in, they embed malicious code designed to pilfer partial payments from blockchain contracts.
Lazarus Group's typical approach involves luring victims with enticing employment offers at reputable companies, tricking them into downloading malicious payloads disguised as documents.
This insidious malware specifically targets individuals who engage in blockchain games, preying on their interest in financial rewards to deceive and steal.
XMRig, a crypto-jacking malware, was discovered in pirated software. The malware is very hard to detect.
The developer who found the vulnerability requested developers to sign their revisions with the GPG key to ensure all their revisions on the project can be verified.
The malware targets Zcash and Ethereum wallets alongside Electrum, Atomic Wallet and Coinomi, it takes your browser extension and login data and reads your chat logs.