The COVERTCATCH malware achieves macOS system compromise
North Korean threat actors are utilising fake job lures to facilitate malware distribution.
According to The Hacker News, malware developers are exploiting LinkedIn to deliver a ZIP file, purporting to be a Python coding challenge, but which contains the novel COVERTCATCH malware.
Analysis from Google Cloud's Mandiant found COVERTCATCH achieves macOS system compromise through a second-stage payload that uses Launch Daemons and Launch Agents to ensure persistence.
"Once a foothold is established via malware, the attackers pivot to password managers to steal credentials, perform internal reconnaissance via code repos and documentation, and pivot into the cloud hosting environment to reveal hot wallet keys and eventually drain funds," said Mandiant.
Written by
Dan Raywood
Senior Editor
SC Media UK
Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.
Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.