Inside the BlueNoroff Web3 macOS Intrusion Analysis
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
A detailed analysis of a sophisticated intrusion targeting a cryptocurrency foundation employee is presented. The attack, attributed to the North Korean APT group BlueNoroff, began with a social engineering lure via Telegram, leading to the installation of malicious software disguised as a Zoom extension. The intrusion involved multiple stages of malware deployment, including persistent implants, backdoors, keyloggers, and cryptocurrency stealers. The attackers utilized advanced techniques such as process injection on macOS and leveraged various tools to collect sensitive information, particularly focusing on cryptocurrency-related data. The analysis covers the initial access vector, technical details of the malware components, and their functionalities, providing insights into the evolving tactics of state-sponsored threat actors targeting macOS systems.
OPENCTI LABELS :
apt,stealer,macos,social engineering,cryptocurrency,process injection,dprk,cryptobot,web3,root troy v4,injectwithdyld,xscreen,telegram 2
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Inside the BlueNoroff Web3 macOS Intrusion Analysis