A new wave of macOS malware, notnullOSX, is targeting crypto users via a fake wallpaper app and a hijacked YouTube channel. The campaign relies on social engineering to trick victims into granting dangerous permissions, enabling the theft of sensitive data and crypto assets.
North Korea’s HexagonalRodent cell, part of the notorious Lazarus group, is using fake coding challenges and AI-powered malware to compromise thousands of developer systems and steal millions in cryptocurrency.
North Korean hackers have stolen more than $12 million in cryptocurrency by targeting out-of-work developers with convincing fake job offers and malware, marking a new wave of socially engineered cybercrime.
KelpDAO lost $290 million in a sophisticated cross-chain attack, with evidence pointing to North Korea’s Lazarus Group. The breach highlights new threats facing DeFi protocols and the crypto industry.
A wave of Steam games secretly embedded with malware has triggered a major FBI investigation after hundreds of gamers lost cryptocurrency and online accounts. The agency is urgently seeking victims and evidence to track down the perpetrators.
ClipXDaemon is a newly discovered malware targeting Linux systems, hijacking the X11 clipboard to intercept and manipulate cryptocurrency transfers. Discover how this stealthy threat operates and why it signals a shift in cybercrime tactics.
A convincing fake CleanMyMac website is distributing SHub Stealer malware, targeting Mac users’ crypto wallets and personal data. The attack uses social engineering, bypasses built-in defenses, and even backdoors wallet apps for long-term theft.
North Korea–linked hackers have shifted from simple crypto theft to complex, AI-driven scams, insider infiltration, and even building fake projects to siphon funds. Their evolving playbook has netted billions and now poses an unprecedented threat to the global crypto ecosystem.
DigitStealer is a sophisticated macOS infostealer focusing on Apple Silicon devices, but its operators’ predictable backend and sloppy infrastructure choices provide defenders with critical opportunities for detection and disruption.
Mac users are now targets as hackers use ChatGPT and Google Ads to spread the AMOS stealer, compromising crypto wallets and sensitive data. Learn how these attacks work and how to protect yourself.