A multi-level collaboration between the FBI, DoJ, and Ukrainian Cyber and National Police this week culminated in the seizure of nine cryptocurrency laundering websites. According to authorities, the sites were used mainly by cybercriminals and ransomware groups for money laundering and crypto exchange services. The joint takedown also includes all servers related to the sites.
Last week, the FBI and international partners disrupted nine virtual currency exchange services which facilitated money laundering and allowed users to avoid law enforcement detection. #CyberIsATeamSport https://t.co/GqtlzI7g2b pic.twitter.com/sCllgynKnZ
— FBI (@FBI) May 2, 2023
In their press release, the FBI listed the domains 24xbtc.com
, 100btc.pro
, pridechange.com
, 101crypta.com
, uxbtc.com
, trust-exchange.org
, bitcoin24.exchange
, paybtc.pro
, and owl.gold
; all of which violated virtual currency codes of conduct to create haven for criminal activities and support the greater cybercrime ecosystem. These sites had boasted lax or no Know Your Customer (KYC) and Anti-Money Laundering (AML) measures and many also advertised forums dedicated to discussing criminal activity.
Illicit websites such as these nine allow users to convert stolen cryptocurrency into coins that are harder to trace, blurring the money trail and enabling criminals to anonymously launder their wares under the radar. Reports noted that most of the sites provided live support and instructions in both English and Russian to service a wider range of customers.
Crackdowns like this one have become a primary goal across global law enforcement groups as they race to disrupt hackers’ financial infrastructures and stop the use of stolen goods that further fund malicious activity. Confiscated sites allow authorities to identify associated criminals, possibly leading to more arrests in the future or valuable intel on threat actors’ operational trends.
In a new report published by SentinelLabs this week, researchers revealed that a North Korean-backed APT known as “Kimsuky” has been deploying a previously unseen spy tool in active threat campaigns against Asian, North American, and European organizations. Since 2012, activity from the threat group has indicated their focus on collecting intel through cyber espionage for the North Korean government.
Previous campaigns by Kimsuky often featured the deployment of a malware family called BabyShark. The new report by SentinelLabs highlights an expansion in the groups’ arsenal – the use of an evolved version of BabyShark that includes a reconnaissance capability. Dubbed ‘ReconShark’, this reconnaissance tool has been observed using unique execution instructions and server communication methods.
ReconShark is deployed through spear phishing emails; ones crafted to specifically target an individual directly. To increase the likelihood of success, the emails are seen to be properly formatted, branded, and abuse the names of real people associated with the email’s fake content. Kimsuky emails include links to download a lure document containing macros that activate the malware on close. Once activated, ReconShark exfiltrates running processes, battery information, and any endpoint threat detection solutions deployed on the infected platform. Additionally, the malware deploys more payloads through scripts, macro-enabled MS Office templates, or as Windows DLL files.
North Korean state-sponsored APTs continue to evolve their tools, tactics, and techniques to more effectively target their victims. As we see more cases of advanced social engineering and sophisticated malware attacks, organizations in all sectors should continue to take preventative measures against identity based threats, implement multi-factor authentication, and train users on the signs of phishing.
Further research into Atomic Stealer this week revealed the threat actor behind the version being sold on Telegram has developed a second version that appears to be a trojan game installer looking to lure victims through YouTube.
As advertised in a Telegram channel, Atomic Stealer promises cybercriminals a full-fledged infostealer capable of grabbing keychain passwords, browser data, and session cookies. The malware is also known to steal crypto wallets, targeting numerous popular cryptocurrency extensions to nab credentials. The going price is $1000 per month and includes a ready-for-use web interface for threat campaign management.
A second version of the malware was discovered this week that appears to be associated with a YouTube channel advertising “Crypto ALMV”, supposedly a game offering with crypto wallet integration that promises “secure cryptocurrency wallet in metaverse”.
Distributed as a stand-alone executable called ‘Game Installer’, the malicious binary contains functions to steal passwords, wallets and browser secrets. Tellingly, the author left strings such as “ATOMIC STEALER” embedded in the binary. Given that the Telegram variant reached out to a URL of amos-malware[.]ru/sendlogillegal
, it’s clear the author isn’t expecting much scrutiny from victims.
The increasing occurrence of macOS-targeted infostealers reflects how lucrative the OS has become as a target, both at the enterprise level and the personal level. Users would be wise to ensure that they have additional protection and visibility for their Mac devices aside from the default security protections provided by Apple.