Description

Researchers have identified a new North Korean cyber espionage malware campaign named BeaverTail, which targets job seekers. Initially a JavaScript-based information stealer, it has now evolved into a native macOS version, posing as legitimate software such as the MiroTalk video call service. BeaverTail is designed to steal sensitive information, including browser data and cryptocurrency wallets. Group-IB Threat Intelligence recently discovered that the malware is now also targeting Windows users through weaponized games. Two significant developments have been noted: a new Windows version of BeaverTail and an advanced JavaScript variant. The latter spreads through seemingly innocent titles built on ReactJS, concealed within NPM packages that can be integrated into various development projects. The Lazarus group has shown adaptability in attacking different operating systems and development environments. The Windows version of BeaverTail masquerades as a legitimate conferencing app, FCCCall.exe, similar to a previous operation that trojanized the MiroTalk application. This recent campaign, likely conducted between late July and early August, demonstrates the group’s tendency to exploit communication software to target host devices. BeaverTail’s primary objectives remain consistent across versions: obtaining cryptocurrency wallet information and downloading/executing the next-step payload, InvisibleFerret. However, the malware’s scope has expanded, now targeting a broader range of browser extensions including kaikas, rabby, argent X, and Exodus web3. This expansion indicates that BeaverTail’s operators aim to capture a larger volume of victims’ cryptocurrency assets, underscoring the evolving nature of this sophisticated cyber threat.