Remove Applications Remove Malware Remove Open Source Remove Systems Administration
article thumbnail

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

The threat actors use social engineering to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems. They use the apps to gain access to the victim's computer and install malware across the network environment, stealing private keys and exploiting other security gaps.

Malware 81
article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

In some cases they’re taking open source, community-based tools and leveraging them in creative new ways against common threats. Vamosi: In EP 49, I talked about Living off the Land, a attack strategy that uses existing applications on a victim’s machine, as opposed to downloading a new Zero Day or something cool like that.

Tools 40