BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Japanese cryptocurrency exchange hit by JokerSpy attack

    Recently disclosed malware masquerades as the built-in antivirus in macOS.

    Unidentified hackers attacked a Japanese cryptocurrency exchange and installed JokerSpy malware on its macOS computers. This was reported by Elastic Security Labs, which tracks attackers under the code name REF9134.

    JokerSpy is a sophisticated toolkit designed to hack macOS machines. It was first described by Bitdefender last week. JokerSpy consists of several programs written in Python and Swift that allow you to collect data and execute arbitrary commands on infected hosts.

    One of the core components of JokerSpy is a self-signed binary called "xcc" that checks for full disk access and screen recording permissions. The file is signed as XProtectCheck, which indicates an attempt to disguise itself as XProtect, the built-in antivirus technology in macOS.

    “On June 1, a new Python tool was spotted that ran from the same directory as xcc and was used to run an open-source post-operational tool for macOS called Swiftbelt,” Elastic security researchers said.

    The attack targeted a major Japanese cryptocurrency service provider specializing in asset swaps to trade Bitcoin, Ethereum and other mainstream cryptocurrencies. The name of the company was not disclosed.

    The "xcc" binary is run with Bash through three different applications: IntelliJ IDEA, iTerm (terminal emulator for macOS), and Visual Studio Code.

    Another module installed as part of the attack is sh.py, a Python implant that is used as a conduit for delivering other post-exploitation tools such as Swiftbelt.

    macOS users should be careful not to download suspicious files or programs from untrusted sources. It is also recommended to use a reliable antivirus and update the system and applications on time. This is the only way to protect your data and cryptocurrency from hackers.

    Author DeepWeb
    Espionage turned into a leak: hackers posted data of thousands of LetMeSpy users online
    Japan emboiled in cyberwar flames: Who and Why is attacking the land of the rising sun?

    Comments 0

    Add comment