North Korean hackers deploy ‘Durian’ malware, targeting crypto firms

0


North Korean hackers are utilizing a “striking” new malware variant dubbed “Durian” to reportedly launch attacks on South Korean crypto firms.

The North Korean hacking group Kimsuky used the new malware in a series of targeted attacks on at least two cryptocurrency firms so far, according to a May 9 threat report from cybersecurity firm Kaspersky.

This was done through a “persistent” attack by exploiting legitimate security software used exclusively by crypto firms in South Korea.

Source: Kaspersky

The previously unknown Durian malware acts as an installer that deploys a continued stream of malware including a backdoor known as “AppleSeed,” a custom proxy tool known as LazyLoad, and other legitimate tools such as Chrome Remote Desktop.

“Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads, and exfiltration of files,” wrote Kaspersky.

Additionally, Kaspersky noted that LazyLoad was also used by Andariel, a sub-group within fellow North Korean hacking consortium Lazarus Group — something that suggested a “tenuous” connection between Kimsuky and the more notorious hacking group.

Related: North Korean Lazarus hacker group using LinkedIn to target and steal assets: Report

First emerging in 2009, Lazarus has established itself as one of the most notorious groups of crypto hackers.

On April 29, independent blockchain sleuth ZachXBT revealed that the Lazarus group had successfully laundered over $200 million in ill-gotten crypto between 2020 and 2023.

In total, the Lazarus Group is accused of stealing over $3 billion in crypto assets in the six years leading up to 2023.

Lazarus was credited with stealing over 17% — a little over $309 million — of the total stolen funds in 2023. Throughout 2023 more than $1.8 billion worth of crypto was lost to hacks and exploits, according to a Dec. 28 report by Immunefi.

Magazine: Lazarus Group’s favorite exploit revealed — Crypto hacks analysis