RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurre

Summary:
This report from Palo Alto Networks’ Unit 42 details a sophisticated macOS malware campaign, attributed with moderate confidence to North Korean state-sponsored threat actors, targeting job-seeking software developers within the cryptocurrency sector. The attack leverages social engineering, disguised as legitimate job opportunities and software updates, to deliver two primary malware families: RustDoor, a Rust-based backdoor, and a newly discovered macOS variant of Koi Stealer, an information stealer focused on cryptocurrency wallets. The campaign exhibits advanced evasion techniques, including manipulating macOS components and runtime string decryption. Attackers demonstrated persistence, attempting multiple malware deployments and using reverse shells to maintain persistent access. The Koi Stealer malware, mimicking a Visual Studio update, collects sensitive data in two stages, utilizing AppleScript for stealthy file exfiltration. The campaign shares similarities with previous North Korean attacks, including deploying RustDoor and targeting cryptocurrency professionals, but also displays unique TTPs, suggesting a distinct operation separate from DPRK’s Contagious Interview campaign.

Security Officer Comments:
The report underscores the growing threat of macOS malware, particularly from state-sponsored actors. The discovery of a macOS variant of Koi Stealer is significant, demonstrating the increasing cross-platform capabilities of threat actors. The malware's focus on cryptocurrency wallets, coupled with its information-stealing capabilities, underscores the financial motivations of the attack. The attacker’s use of AppleScript to exfiltrate files emphasizes the attacker’s attempt to evade detection. The comparison of the Windows and macOS variant of Koi Stealer shows that the threat actors are porting their tools to multiple platforms.

The use of social engineering, particularly fake job interviews and software updates, remains a highly effective attack vector. The moderate confidence attribution to North Korea is based on multiple factors including the use of RustDoor (previously linked to Sapphire Sleet), targeting of cryptocurrency developers (consistent with North Korean financial motivations), and alignment with FBI warnings about North Korean social engineering. The report acknowledges the possibility of RustDoor being used by multiple North Korean groups, highlighting the challenge of definitive attribution. The use of reverse shells and command-and-control (C2) infrastructure associated with known malware (RedLine Stealer) indicates a level of sophistication and resourcefulness. The manipulation of macOS components and the use of runtime decryption demonstrate the attackers' efforts to remain undetected. The persistence and resourcefulness of the attackers, coupled with their focus on financial gain, strongly suggest a state-sponsored actor. A multilayered approach, including EDR, intrusion detection, and proactive threat hunting, is essential for mitigating these threats. Organizations, especially those in the cryptocurrency sector, must prioritize social engineering awareness training and implement robust security measures.

Suggested Corrections:
IOCs are available here.

Organizations can make APT groups’ lives more difficult. Here’s how:
  • Defense-in-depth strategy: A comprehensive defense-in-depth strategy is crucial to combat APTs. This includes implementing multiple layers of security controls, such as strong perimeter defenses, network segmentation, endpoint protection, intrusion detection systems, data encryption, access controls, and continuous monitoring for anomalies.
  • Threat intelligence and sharing: Ideally, organizations should actively participate in threat intelligence sharing communities and collaborate with industry peers, government agencies, and security vendors. Sharing information about APTs and their techniques can help detect and mitigate attacks more effectively.
  • Employee education and awareness: Regular security awareness programs, phishing simulations, and training sessions can educate employees about the latest threats, social engineering techniques, and safe computing practices.
  • Incident response and recovery: Regardless of preventive measures, organizations should have a well-defined incident response plan. This includes incident detection, containment, eradication, and recovery procedures to minimize the impact of APT attacks and restore normal operations.
Link(s):
https://unit42.paloaltonetworks.com/macos-malware-targets-crypto-sector/