The North Korean risk actors behind macOS malware strains similar to RustBucket and KANDYKORN have been noticed “mixing and matching” totally different parts of the 2 disparate assault chains, leveraging RustBucket droppers to ship KANDYKORN.
The findings come from cybersecurity agency SentinelOne, which additionally tied a 3rd macOS-specific malware referred to as ObjCShellz to the RustBucket marketing campaign.
RustBucket refers to an exercise cluster linked to the Lazarus Group through which a backdoored model of a PDF reader app, dubbed SwiftLoader, is used as a conduit to load a next-stage malware written in Rust upon viewing a specifically crafted lure doc.
The KANDYKORN marketing campaign, however, refers to a malicious cyber operation through which blockchain engineers of an unnamed crypto alternate platform have been focused through Discord to provoke a classy multi-stage assault sequence that led to the deployment of the eponymous full-featured reminiscence resident distant entry trojan.
The third piece of the assault puzzle is ObjCShellz, which Jamf Menace Labs revealed earlier this month as a later-stage payload that acts as a distant shell that executes shell instructions despatched from the attacker server.
Additional evaluation of those campaigns by SentinelOne has now proven that the Lazarus Group is using SwiftLoader to distribute KANDYKORN, corroborating a latest report from Google-owned Mandiant about how totally different hacker teams from North Korea are more and more borrowing one another’s ways and instruments.
“The DPRK’s cyber panorama has advanced to a streamlined group with shared tooling and concentrating on efforts,” Mandiant famous. “This versatile strategy to tasking makes it troublesome for defenders to trace, attribute, and thwart malicious actions, whereas enabling this now collaborative adversary to maneuver stealthily with larger pace and adaptableness.”
This contains the usage of new variants of the SwiftLoader stager that purports to be an executable named EdoneViewer however, in actuality, contacts an actor-controlled area to possible retrieve the KANDYKORN RAT based mostly on overlaps in infrastructure and the ways employed.
The disclosure comes because the AhnLab Safety Emergency Response Middle (ASEC) implicated Andariel – a subgroup inside Lazarus – to cyber assaults exploiting a safety flaw in Apache ActiveMQ (CVE-2023-46604, CVSS rating: 10.0) to put in NukeSped and TigerRAT backdoors.