The cybersecurity community has recently identified a sophisticated macOS malware, named ‘KandyKorn,’ associated with a cyber campaign led by the notorious North Korean Lazarus hacking group. The primary targets are blockchain engineers linked to cryptocurrency exchange platforms. This campaign is unique in its approach, leveraging social engineering tactics within Discord channels to distribute Python-based modules, culminating in the multi-stage KandyKorn infection. Elastic Security’s analysis revealed similarities in techniques, network infrastructure, and code-signing certificates with Lazarus’ previous campaigns, confirming their involvement.

Technical Details

The KandyKorn attack unfolds on Discord, beginning with social engineering strategies to trick victims into downloading a deceptive ZIP archive named ‘Cross-platform Bridges.zip.’ This package, posing as a legitimate arbitrage bot for cryptocurrency transactions, contains a Python script (‘Main.py’) that imports 13 modules, triggering the infection chain. The first payload, ‘Watcher.py,’ acts as a downloader, which then extracts and executes additional scripts (‘testSpeed.py’ and ‘FinderTools’) from a Google Drive URL. ‘FinderTools,’ functioning as a dropper, retrieves and executes an obfuscated binary named ‘SugarLoader.’ SugarLoader, disguised as .sld and .log Mach-O executables, connects to a command and control server to load KandyKorn.

A key stage involves HLoader, masquerading as Discord, employing binary code-signing techniques similar to Lazarus’ past operations. It secures persistence for SugarLoader by hijacking the legitimate Discord application. This includes renaming itself and the genuine Discord binary, executing both, and then reverting the names, a technique known as execution flow hijacking.

KandyKorn, the ultimate payload, is a sophisticated backdoor with capabilities like data retrieval, file management, process termination, and command execution. It highlights Lazarus’ focus on the cryptocurrency sector, driven by financial motives.

Recommendations

To mitigate risks posed by such advanced malware, several cybersecurity practices are recommended:

  1. User Education and Awareness: Training programs can help in recognizing social engineering tactics and scrutinizing downloads.
  2. Multi-Factor Authentication (MFA): Implement MFA for critical accounts to prevent unauthorized access.
  3. Email Filtering and Web Security: Use solutions to block phishing emails and access to malicious websites.
  4. Patch and Update Management: Regularly update all software to patch vulnerabilities.
  5. Endpoint Security: Deploy solutions with antivirus, intrusion detection, and behavioral analysis.
  6. Network Segmentation: Isolate sensitive systems to limit breach impacts.
  7. Application Whitelisting: Restrict execution of unauthorized programs to prevent malicious software execution.
  8. Cybersecurity Hygiene: Encourage strong passwords and regularly update access permissions.

Ending Notes

The emergence of ‘KandyKorn’ malware by the Lazarus group is a significant development in the cybersecurity landscape. It showcases the group’s evolving capabilities, particularly in targeting macOS systems and exploiting social engineering channels like Discord. This campaign’s focus on the cryptocurrency sector for financial gains, rather than espionage, marks Lazarus as a persistent threat in this domain. The incident is a clear indicator of the need for heightened security measures in the cryptocurrency industry and among macOS users, emphasizing the importance of vigilance and comprehensive cybersecurity practices to effectively counter these sophisticated threats.

Also Read: