The new macOS remote access Trojan from the Lazarus Group uses a two-factor authentication app as its delivery mechanism.
A new variant of the Dacls remote access Trojan (RAT) is on the loose, this time in a version specifically intended for macOS targets. According to the researchers at Malwarebytes who identified the new code, it's being carried onto victims' computers through a Trojanized two-factor authentication application, MinaOTP, mostly used by Chinese speakers on macOS.
Dacls is a RAT associated with North Korea's Lazarus Group (also known as Hidden Cobra and APT 38). First discovered in December 2019 by Qihoo 360 NetLab, Dacls came onto the scene as a fully functional RAT active on Windows and Linux systems.
For more, read here.
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024