Loading...
Loading...
Browse all stories on DeepNewz
VisitWhat will be the primary method of BlueNoroff malware distribution by June 30, 2025?
Phishing emails • 25%
Compromised software downloads • 25%
Malicious websites • 25%
Other • 25%
Reports from cybersecurity firms and news articles
BlueNoroff Develops MacOS Malware Using Flutter to Bypass Security, Targeting Cryptocurrency Users
Nov 12, 2024, 01:00 PM
North Korean hacker group BlueNoroff has developed new malware specifically targeting MacOS users involved in cryptocurrency transactions. The malware, disguised within seemingly harmless MacOS applications, employs sophisticated coding techniques to bypass traditional security measures, including signed developer IDs. This new threat has raised alarms within the cryptocurrency industry, as it poses significant risks to users who may unknowingly download the compromised applications. Experts indicate that the malware utilizes Flutter, a popular framework, to deliver its payload, further complicating detection efforts and enhancing the hackers' ability to exploit vulnerabilities in MacOS systems.
View original story
Cloud services • 25%
Email phishing • 25%
Social engineering • 25%
Other • 25%
Phishing • 25%
RDP exploits • 25%
RMM tools • 25%
Other • 25%
Phishing emails • 25%
Malicious websites • 25%
Compromised software updates • 25%
Other • 25%
Energy sector • 25%
Financial sector • 25%
Transportation sector • 25%
Other • 25%
Phishing • 25%
Zero-day exploits • 25%
Malware • 25%
Other • 25%
Phishing • 25%
Direct network attack • 25%
Malware installation • 25%
Other • 25%
Phishing attacks • 25%
Direct server exploitation • 25%
Malware distribution • 25%
Other • 25%
Email phishing • 25%
Malicious software update • 25%
Compromised websites • 25%
Other • 25%
Nearest Neighbor Attack • 25%
Phishing • 25%
Malware • 25%
Other • 25%
Phishing • 25%
Malware • 25%
DDoS • 25%
Exploiting Vulnerabilities • 25%
Polyfill.io service • 33%
Compromised WordPress plugins • 33%
Both equally • 33%
Router vulnerabilities • 25%
Camera vulnerabilities • 25%
Other internet-connected devices • 25%
Unknown/Multiple methods • 25%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
Other • 25%
Binance • 25%
Coinbase • 25%
Kraken • 25%