Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

The Hacker News by The Hacker News
February 4, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Feb 04, 2025Ravie LakshmananMalware / Cryptocurrency

The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple macOS malware strains dubbed FERRET as part of a supposed job interview process.

“Targets are typically asked to communicate with an interviewer through a link that throws an error message and a request to install or update some required piece of software such as VCam or CameraAccess for virtual meetings,” SentinelOne researchers Phil Stokes and Tom Hegel said in a new report.

Contagious Interview, first uncovered in late 2023, is a persistent effort undertaken by the hacking crew to deliver malware to prospective targets through bogus npm packages and native apps masquerading as videoconferencing software. It’s also tracked as DeceptiveDevelopment and DEV#POPPER.

These attack chains are designed to drop a JavaScript-based malware known as BeaverTail, which, besides harvesting sensitive data from web browsers and crypto wallets, is capable of delivering a Python backdoor named InvisibleFerret.

Cybersecurity

In December 2024, Japanese cybersecurity company NTT Security Holdings revealed that JavaScript malware is also configured to fetch and execute another malware known as OtterCookie.

The discovery of the FERRET family of malware, first uncovered towards the end of 2024, suggests that the threat actors are actively honing their tactics to evade detection.

This includes the adoption of a ClickFix-style approach to trick users into copying and executing a malicious command on their Apple macOS systems via the Terminal app in order to address a problem with accessing the camera and microphone through the web browser.

According to security researcher Taylor Monahan, who goes by the username @tayvano_, the attacks originate with the attackers approaching the targets on LinkedIn by posing as recruiters and urging them to complete a video assessment. The end goal is to drop a Golang-based backdoor and stealer that’s designed to drain the victim’s MetaMask Wallet and run commands on the host.

macOS Malware

Some of the components associated with the malware have been referred to as FRIENDLYFERRET and FROSTYFERRET_UI. SentinelOne said it identified another set of artifacts named FlexibleFerret that takes care of establishing persistence on the infected macOS system by means of a LaunchAgent.

It’s also engineered to download an unspecified payload from a command-and-control (C2) server, which is no longer responsive.

Furthermore, the FERRET malware has been observed being propagated by opening fake issues on legitimate GitHub repositories, once again pointing to a diversification of their attack methods.

“This suggests that the threat actors are happy to expand the vectors by which they deliver the malware beyond the specific targeting of job seekers to developers more generally,” the researchers said.

The disclosure comes days after supply chain security firm Socket detailed a malicious npm package named postcss-optimizer containing the BeaverTail malware. The library remains available for download from the npm registry as of writing.

Cybersecurity

“By impersonating the legitimate postcss library, which has over 16 billion downloads, the threat actor aims to infect developers’ systems with credential-stealing and data-exfiltration capabilities across Windows, macOS, and Linux systems,” security researchers Kirill Boychenko and Peter van der Zee said.

The development also follows the discovery of a new campaign mounted by the North Korea-aligned APT37 (aka ScarCruft) threat actor that involved distributing booby-trapped documents via spear-phishing campaigns to deploy the RokRAT malware, as well as propagate them to other targets over group chats through the K Messenger platform from the compromised user’s computer.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections

Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections

Recommended.

Intel: New Xeon 6 CPU Boosts GPU Performance In Nvidia’s DGX B300 System

Intel: New Xeon 6 CPU Boosts GPU Performance In Nvidia’s DGX B300 System

May 22, 2025
ThoughtSpot Sees Its ‘Spotter” AI Agent Technology As The Future Of Data Analytics

ThoughtSpot Sees Its ‘Spotter” AI Agent Technology As The Future Of Data Analytics

April 11, 2025

Trending.

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

June 28, 2025
Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

June 27, 2025
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

June 27, 2025
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

June 23, 2025
Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

June 27, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio