••• All important news related to new attacks and see the solutions we can offer you •••
Malware authors trick Apple into trusting malicious Shlayer apps
The authors of the Mac malware known as Shlayer have successfully managed to get their malicious payloads through Apple's automated notarizing process.
Since February 2020 all Mac software distributed outside of its Mac App Store must be notarized by Apple to be able to run on macOS Catalina and above.
The notarization process requires developers to submit software they built for the macOS platform to be scanned through Apple's notary service, an automated system designed to scan submitted software for both malicious components and code-signing issues.
If they pass this automated security check, the apps are allowed by the macOS Gatekeeper - a macOS security feature that checks if downloaded apps have been checked for known malicious content - to run on the system.
North Korea's BeagleBoyz Robbing BanksRead the original article here
This joint advisory is the result of analytic efforts among the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), the Federal Bureau of Investigation (FBI) and U.S. Cyber Command (USCYBERCOM). Working with U.S. government partners, CISA, Treasury, FBI, and USCYBERCOM identified malware and indicators of compromise (IOCs) used by the North Korean government in an automated teller machine (ATM) cash-out scheme—referred to by the U.S. Government as “FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks.”
New identified malware used by the NorthKorean government in an automated teller machine (ATM) cash-out.
This mallware can be simulated and your can test if your environment is vulnerable using Cymulate BAS solution
DeathStalker APT Targets SMBs with Cyber Espionage
The hacker-for-hire group, operating since at least 2012, primarily targets financial firms.
Small and midsize businesses (SMBs) should have a new advanced persistent threat (APT) on their collective radar: DeathStalker has been targeting SMBs in the financial sector since at least 2012.
Kaspersky researchers tracking the group since 2018 report DeathStalker has targeted companies around the world.
Attackers don't seem motivated by financial gain; they don't deploy ransomware or steal payment data.
The focus is sensitive business data, which could mean DeathStalker offers hacker-for-hire services, or serves as a sort of "information broker," in financial circles.