macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed
Feb. 4, 2025, 9:44 a.m.
Tags
External References
Description
This intelligence analysis describes newly discovered variants of the DPRK-attributed macOS Ferret malware family, labeled as 'FlexibleFerret'. The malware is part of the ongoing 'Contagious Interview' campaign targeting developers and job seekers. The new variants include a dropper package containing multiple components, including a fake Zoom binary and an InstallerAlert application. These components establish persistence and communicate with a command and control server. The campaign has expanded its tactics, now targeting GitHub users by creating fake issues on legitimate repositories. The malware remains undetected by Apple's XProtect tool, highlighting the evolving nature of the threat.
Date
Published: Feb. 4, 2025, 8:35 a.m.
Created: Feb. 4, 2025, 8:35 a.m.
Modified: Feb. 4, 2025, 9:44 a.m.
Indicators
3c4becde20e618efb209f97581e9ab6bf00cbd63f51f4ebd5677e352c57e992a
zoom.callservice.us
Attack Patterns
ChromeUpdate
MULTI_FROSTYFERRET_CMDCODES
FRIENDLYFERRET_SECD
FlexibleFerret
FROSTYFERRET_UI
DPRK
T1553.002
T1547.001
T1059.004
T1071.001
T1036.005
T1543.001
T1204.002
T1059.002
T1105
T1566.001
T1027
Additional Informations
Technology