Malware & RansomwareHIGH

NotnullOSX Malware - Targets High-Value Crypto Assets

Featured image for NotnullOSX Malware - Targets High-Value Crypto Assets
#notnullOSX#crypto theft#0xFFF#macOS#malware

Original Reporting

SCSC Media

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk β€” action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NamenotnullOSX
Malware TypeTrojan
Threat Actor0xFFF (alh1mik)
Target PlatformmacOS
Delivery MethodSocial Engineering
Persistence MechanismTotal Disk Access
C2 Infrastructureβ€”
CapabilitiesStealing cryptocurrency seed phrases
IOCs Availableβ€”
Detection Rateβ€”
MITRE ATT&CKT1071.001 (Application Layer Protocol: Web Protocols)
🎯

Basically, a new malware is tricking people to steal their cryptocurrency.

Quick Summary

A new malware, notnullOSX, is targeting cryptocurrency wallets worth over $10,000. Users in Taiwan, Vietnam, and Spain are particularly at risk. This malware tricks victims into downloading it, leading to potential theft of their crypto assets.

What Happened

A novel malware named notnullOSX has emerged, specifically designed to target high-value cryptocurrency assets. Reports indicate that this malware has been actively exploiting vulnerabilities in macOS systems, particularly focusing on cryptocurrency wallets containing over $10,000. The campaign, identified as ClickFix, began on March 30 and has affected users in Taiwan, Vietnam, and Spain.

How It Works

The malware operates by luring victims through deceptive means. Attackers have used a fraudulent Google Document, claiming issues with an outdated Google API Connector, and an illicit application named WallSpace, promoted through compromised YouTube channels. When victims interact with these lures, they are tricked into executing a command in the macOS Terminal, which downloads the notnullOSX malware while granting it total disk access.

Once installed, notnullOSX deploys multiple modules. The most concerning is ReplaceApp, which replaces legitimate hardware wallet applications like Trezor or Ledger Live with counterfeit versions. This allows attackers to exfiltrate secret seed phrases in real-time, putting victims' crypto assets at significant risk.

Who's Behind It

The development of notnullOSX can be attributed to a threat actor known as 0xFFF, also referred to as alh1mik. This individual resurfaced on a major hacking forum earlier this year after a three-year hiatus, showcasing their new malware to the community.

Signs of Infection

Users should be vigilant for signs of infection, including:

  • Unexpected prompts to execute commands in Terminal.
  • Unusual activity involving cryptocurrency wallets.
  • Alerts or notifications from security software regarding unauthorized access.

How to Protect Yourself

To safeguard against notnullOSX and similar threats:

  • Avoid executing commands from untrusted sources.
  • Regularly update your macOS and security software.
  • Use hardware wallets with high security and be cautious of any applications that request sensitive access.
  • Consider using multi-factor authentication for cryptocurrency accounts.

By staying informed and cautious, users can better protect themselves from this emerging threat.

πŸ” How to Check If You're Affected

  1. 1.Check for any unauthorized applications installed on your macOS.
  2. 2.Review access logs for your cryptocurrency wallets.
  3. 3.Run a full system scan with updated antivirus software.

🏒 Impacted Sectors

Finance

Pro Insight

πŸ”’ Pro insight: The sophisticated tactics employed by notnullOSX highlight the evolving landscape of malware targeting cryptocurrency, necessitating enhanced user awareness and security measures.

Sources

Original Report

SCSC Media
Read Original

Related Pings

HIGHMalware & Ransomware

AI-Poisoning - Evolved AMOS Stealer Threatens macOS Users

Hackers are exploiting AI trust to deliver the AMOS Stealer, targeting Mac users. This malware uses social engineering to bypass traditional defenses, posing significant risks. Stay informed and protect your devices from this evolving threat.

Huntress BlogΒ·
HIGHMalware & Ransomware

CPUID Website Compromised - Weaponized HWMonitor and CPU-Z Tools

The CPUID website has been compromised, delivering trojanized versions of HWMonitor and CPU-Z. Users downloading these tools may face serious malware risks. Immediate action is advised.

Cyber Security NewsΒ·
MEDIUMMalware & Ransomware

Obfuscated JavaScript Delivered via Phishing Email Alert

A malicious JavaScript file named cbmjlzan.JS was found in a phishing email. Only 15 antivirus programs flagged it, raising concerns about detection. Stay vigilant against such threats.

SANS ISC Full TextΒ·
HIGHMalware & Ransomware

Cracked Software - 5 Ways to Mitigate Security Risks

Cracked software is a hidden danger in many organizations. Employees often download these versions without realizing the risks. Discover five effective strategies to mitigate these threats.

SC MediaΒ·
HIGHMalware & Ransomware

STX RAT - Targets Finance Sector With Stealth Tactics

STX RAT, a new remote access trojan, is targeting the finance sector with advanced stealth tactics, posing a significant threat to sensitive data.

Infosecurity MagazineΒ·
HIGHMalware & Ransomware

Phishing Attack - Google Storage Delivers Remcos RAT

A new phishing attack is using Google Cloud Storage to deliver Remcos RAT. This sophisticated campaign targets unsuspecting users globally, exploiting trust in Google. Stay alert to avoid falling victim.

Cyber Security NewsΒ·