ID | Votes | Profile Description |
---|---|---|
AppleJeus | 2 | AppleJeus is a notorious malware attributed to the North Korean APT Lazarus Group, designed primarily to steal cryptocurrency. This malicious software has been a key instrument in North Korea's financial theft operations, with threat groups pilfering $2.3 billion USD worth of crypto assets between M |
Kupay Wallet | 1 | Kupay Wallet is a malicious software (malware) identified as part of the AppleJeus Version 4 malware family, developed and deployed by North Korean hackers, referred to by the U.S. government as HIDDEN COBRA. The malware was developed between March 2018 and September 2020, alongside other malicious |
ID | Type | Votes | Profile Description |
---|---|---|---|
Dorusio | Unspecified | 1 | Dorusio is a malware application that is part of the "AppleJeus" family, a group of malicious cryptocurrency applications developed by North Korean hackers, also known as HIDDEN COBRA. The Dorusio program, which mimics an open-source cryptocurrency wallet application, was developed alongside other m |
Cryptoistic | Unspecified | 1 | Cryptoistic is a malware that was compiled on April 2nd, 2020, and is designed to exploit and damage computer systems. It appears to be part of a trend of trojanizing cryptocurrency-related apps and was circulated at the same time as TinkaOTP and CoinGoTrade. While CoinGoTrade is written primarily i |
Poolrat | Unspecified | 1 | PoolRat, a harmful malware previously classified as SimpleSea by threat intelligence firms, is designed to exploit and damage computer systems. This C/C++ macOS implant has the capability of collecting basic system information and executing arbitrary commands, including carrying out file operations. |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | a year ago | N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CX |
CERT-EU | a year ago | N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CX |
MITRE | a year ago | Four Distinct Families of Lazarus Malware Target Apple's macOS Platform |
CERT-EU | a year ago | 3CX hack highlights risk of cascading software supply-chain compromises |
MITRE | a year ago | AppleJeus: Analysis of North Korea’s Cryptocurrency Malware | CISA |