• State-sponsored attackers crafted convincing faux video calls to focus on cryptocurrency companies
  • A clipboard hijack trick changed benign instructions with malware‑deploying code
  • The operation enabled fast credential theft, persistence, and full system compromise

Safety researchers Arctic Wolf have revealed particulars of a highly sophisticated campaign focusing on North American Web3 and cryptocurrency corporations.

It’s carried out by state-sponsored risk actors known as BlueNoroff, a financially motivated subgroup of the dreaded North Korean Lazarus Group, with a objective of creating persistent entry on their goal’s units.


Source link