Lazarus versteckt Malware-Loader in Git-Hooks bei Entwickler-zielenden Angriffen am 9. Mai

Laut OpenSourceMalware-Forschung hat die nordkoreanische Hackergruppe Lazarus bei Entwickler-gezielten Angriffen am 9. Mai zweite Stufe Loader in Git-Hooks in Pre-Commit-Skripten versteckt. Die Gruppe nutzte die Technik in Kampagnen wie „Infectious Interview“, bei denen sie sich als Krypto- und DeFi-Recruiter ausgab, um Entwickler dazu zu bringen, bösartige Code-Repositories zu klonen, um letztlich Krypto-Assets und Anmeldedaten zu stehlen.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Kommentieren
0/400
Keine Kommentare