Massive macOS Campaign Targets Crypto Wallets, Data

  /     /     /  
Publicated : 23/11/2024   Category : security


Massive macOS Campaign Targets Crypto Wallets, Data


Threat actors are distributing new Realst infostealer via fake blockchain games, researchers warn.



Users of macOS devices on the hunt for free blockchain games might want to put in some extra effort at verifying the authenticity of the games before downloading and using them.
In recent weeks, a threat actor has been pushing several blockchain games with interesting sounding titles such Brawl Earth, WildWorld, Evolion, Pearl, SaintLegend, and Olymp of Reptiles that in reality are an information stealer dubbed Realst aimed at macOS users.
Blockchain gamers that downloaded the games have ended up with their cryptocurrency wallets drained in a hurry or having their stored password and browser data stolen, SentinelOne warned in a report this week.
The security vendor
recently analyzed 59 Realst samples
and discovered 16 variants in the data set. About a third of the samples had code strings in them that suggest the threat actor is already targeting macOS 14 Sonoma — a version of the operating system that is still in beta testing and which Apple expects to release later this year. Some of the samples were digitally signed with an Apple Developer ID, that has since been revoked, SentineOne said.
The security vendor has assessed the Realst infostealer campaign is likely linked to another infostealer called
PureLand
that surfaced in March and targeted seven data types from macOS users, including session cookies, keychains, and SSH keys. The sheer number of Realst samples and variants suggests the threat actor has expended considerable effort in targeting macOS users for crypto wallet and data theft, SentinelOne said.
Realst and PureLand are not the only macOS infostealers to surface lately. Earlier this month, researchers at
Guardz reported on another macOS stealer
called ShadowVault that a threat actor has made available for rent in an underground forum. Guardzs analysis showed the malware collecting a wide range of data including login credentials, financial data, PII, and so-called seed phrases for recovering and restoring cryptocurrency wallets.
While the Realst campaign might appear targeted mainly at individual consumers, enterprise organizations can become collateral victims, says Phil Stokes, threat researcher at SentinelOne.
Enterprises that allow users to download and launch software without pre-approval from IT [or] security teams can be impacted if employees are enticed by the lure, Stokes says. Although the campaign we reported on is using the promise of free blockchain games to attract victims, the lure could easily be changed to virtually anything else.
Its also important to note that several malicious components of the Realst infostealer are not currently blocked by Apples XProtect service, Stokes warns. And developer-signed and ad hoc-signed versions have been identified — meaning these currently pass Apples Gatekeeper and code signing checks and are not prevented from launching, he says.
Security researcher
iamdeadlyz
was the first to report on the Realst infostealer campaign targeting macOS users. In a report from March, the researcher described the malware as written in the Rust programming language and targeting data stored in a variety of browsers, cryptocurrency wallets, and browser extensions. Targeted browsers include Chrome, Brave, Opera, OperaGX, Firfox, and Vivaldi. Targeted wallets and extensions include Binance Wallet, Trust Wallet, Metamask, Martian Wallet, and TronLink, a crypto wallet that is available as a browser extension. The malware also targets the Telegram messaging app.
According to SentinelOne, the threat actors behind the Realst campaign have set up malicious websites for each of the fake blockchain games and for added effect have created associated Discord and X (the platform formerly known as Twitter) accounts, so users are lulled into believing the games and the websites are authentic.
In many instances the threat actor has approached potential victims through direct messages on social media, inviting them to try out the games. One such message, which SentinelOne posted in its blog, purported to be from the community manager of Olymp of Reptiles and inquired about the recipients interest in becoming a paid tester for the game.
Olymp of Reptiles X profile indicated the account had 2,018 followers and advertised the game as a brand new, absolutely best trading card game that had just started open beta testing. Brawl Earths X profile, meanwhile, suggested the owner established the account in 2014 and had 1,391 followers. A May 24 tweet announced the availability of 2,000 spots for testers to play the game before its general release.
Individuals who fell for the lures soon found that they had become
victims of theft
, SentinelOnes Stokes says.
One victim, who claimed to be a security engineer on their X profile, warned about their crypto wallet being drained barely 10 minutes after the user had downloaded the Brawl Earth game. Project look serious, plenty of docs, twitter with followers, discord with hundreds of users. Before the meeting I decide to test it, there is a real playable game, the victim
noted on the X platform
.

Last News

▸ 5 ways SMBs can enhance security without increasing expenses ◂
Discovered: 26/12/2024
Category: security

▸ New Metasploit module out for IE zero-day flaw used in Labor attack. ◂
Discovered: 26/12/2024
Category: security

▸ Malware in DNS traffic? Watch for these signs. ◂
Discovered: 26/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Massive macOS Campaign Targets Crypto Wallets, Data