MacOS Malware KandyKorn Targets Crypto Owners

Last updated:
Author
Author
Jimmy Aki
About Author

Jimmy has nearly 10 years of experience as a journalist and writer in the blockchain industry. He has worked with well-known publications such as Bitcoin Magazine, CCN, and Blockonomi, covering news...

Last updated:
Why Trust Cryptonews
Cryptonews has covered the cryptocurrency industry topics since 2017, aiming to provide informative insights to our readers. Our journalists and analysts have extensive experience in market analysis and blockchain technologies. We strive to maintain high editorial standards, focusing on factual accuracy and balanced reporting across all areas - from cryptocurrencies and blockchain projects to industry events, products, and technological developments. Our ongoing presence in the industry reflects our commitment to delivering relevant information in the evolving world of digital assets. Read more about Cryptonews
KandyKorn
Source: Pexels

A new MacOS malware, known as KandyKorn and linked to the notorious Lazarus Group, has recently been identified. The malware was discovered by the Elastic Security Labs.

According to an official report published by the blockchain security firm, KandyKorn relies on social engineering tactics, deceiving victims into installing a malicious ZIP file named “Cross-platform Bridges.zip.”

On the outside, this ZIP file appears to be an arbitrage artificial intelligence (AI) bot designed to assist users in generating yield automatically.

Meanwhile, on the inside, the malicious file downloads 13 Python-based modules that collaborate to retrieve user data and information illicitly.

Providing context on how efficient this virus is, the Elastic Security Labs noted that it operates clandestinely, and users are often unaware of events unfolding behind the scenes.

This malware then accesses an affected computer’s directory listing, uploads and downloads files automatically, deletes, processes termination, and executes commands.

To achieve this, the malicious malware is shared on Discord channels by the hackers who present themselves as community moderators. This fosters trust, leading users to download the malicious ZIP file, which subsequently infects and takes control of their laptops.

Expressing concern about the potential impact of the KandyKorn malware on Mac and iOS devices, the Elastic Security Labs team stated that the technique it is deploying is unusual.

This technique allows the malware to persistently bombard the targeted device through a process called execution flow hijacking.

KandyKorn is now a favored malware by the Lazarus Group, according to the report by Elastic Security Labs.

The anonymous group of hackers linked with the Democratic People’s Republic of North Korea (DPKR) has taken a strong interest in the crypto space in the last couple of years.

So far, the Lazarus Group has stolen more than a billion dollars from the nascent industry and has relied on cryptocurrency mixing platforms to harvest their illicit gains.

KandyKorn’s growing presence further highlights the growing level of sophisticated tools these hacking groups now rely on to siphon investors’ digital funds.

However, KandyKorn has not been the only actor in a vast ecosystem of viruses. The popular Telegram bot, Unibot, was also exploited upwards of $560,000 a few days earlier.

According to a tweet by Scopescan on X (formerly Twitter), the exploiter traded regular meme coins from Unibot users for the Ether token.

State-Sponsored Hacking Terrorism

In recent months, global attention has been firmly fixed on the cryptocurrency sector. The primary concern revolves around the ease with which certain groups can employ advanced tools to move funds illicitly with little detection.

While various hacking groups operate in this landscape, the Lazarus Group has earned notoriety as one of the most prominent state-sponsored cyber threat groups within the crypto space.

However, their activities extend beyond the crypto space, as they have recently turned their attention to software companies.

The Kaspersky team recently unveiled a series of cyber attacks by the Lazarus Group. According to a report, the cyber threat group created legitimate software designed to encrypt web communications using digital signatures from the computer networks of organizations.

This enables them to retrieve data, break through firewalls, and upload or download required files and systems.

More Articles

Price Analysis
$TRUMP Pumping Over 20% This Week: Presidential Memecoin Back for Good?
Arslan Butt
Arslan Butt
2025-02-15 15:26:50
Price Analysis
Study Predicts Bitcoin Surge to $1M by Early 2027: Is That Possible?
Arslan Butt
Arslan Butt
2025-02-15 14:45:43
Crypto News in numbers
editors
Authors List + 66 More
2M+
Active Monthly Users Around the World
250+
Guides and Reviews Articles
8
Years on the Market
70
International Team Authors