{"id":6050,"date":"2021-02-23T13:10:34","date_gmt":"2021-02-23T21:10:34","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6050"},"modified":"2024-04-26T13:20:53","modified_gmt":"2024-04-26T20:20:53","slug":"cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/","title":{"rendered":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats"},"content":{"rendered":"<h4>Authors: Victor Sandin and Christopher Kim<\/h4>\n<h4>TLP: WHITE<\/h4>\n<h3>1.\u00a0 Executive Summary<\/h3>\n<p>On 17 February, the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of<\/p>\n<p>Investigation (FBI), and the Department of Treasury (Treasury) published a joint report to highlight the cyber threat posed to cryptocurrency by North Korea, formally known as the Democratic People\u2019s Republic of Korea (DPRK); the report also provides mitigation recommendations and indicators of compromise for detection.<sup>1<\/sup> The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.<sup>2<\/sup><\/p>\n<p>According to these agencies, the Lazarus Group is an advanced persistent threat (APT) group sponsored by the North Korean government. Since 2018, it has been targeting individuals and companies that run cryptocurrency exchanges and financial services, with various versions of AppleJeus, a trojanized cryptocurrency trading application. It enables threat actors to gain access to victims\u2019 systems to steal cryptocurrency, and it is compatible with both Windows and MacOS operating systems.<\/p>\n<p>Lazarus has launched multiple versions of AppleJeus since Kaspersky discovered it in 2018.<sup>3<\/sup> The following sections of this report describe the capabilities of seven different versions of the malware, and there are many similarities across them. All use a Sectigo Secure Sockets Layer (SSL) certificate for the website marketing the malware. This kind of certificate is only domain-validated &#8211; the lowest level of authentication used to validate SSL certificates.<\/p>\n<h3>2.\u00a0 Analysis<\/h3>\n<p>&nbsp;<\/p>\n<h4>2.1.\u00a0 Initial Vector<\/h4>\n<p>In early AppleJeus campaigns, Lazarus used fake websites disguised as legitimate cryptocurrency trading platforms to spread the malware. Lazarus now uses other additional initial infection vectors, such as socially engineered phishing emails and social networking.<\/p>\n<h4>2.2.\u00a0 Targets<\/h4>\n<p>AppleJeus campaigns have targeted several industry sectors, including energy, finance, government, industry, technology and telecommunications. The DPRK likely views cryptocurrency theft as an opportunity to circumvent international sanctions imposed on them. More than 30 countries have been impacted over the last year by Lazarus\u2019 activity, including Argentina, Australia, Belgium, Brazil, Canada, China, Denmark, Estonia, Germany, Hong Kong, Hungary, India, Ireland, Israel, Italy, Japan, Luxembourg, Malta, the Netherlands, New Zealand, Poland, Russia, Saudi Arabia, Singapore, Slovenia, South Korea, Spain, Sweden, Turkey, the United Kingdom, Ukraine, and the United States.<\/p>\n<h4>2.3.\u00a0 AppleJeus Version 1: Celas Trade Pro<\/h4>\n<p>In this campaign &#8211; which was ongoing until at least late January 2021 &#8211; Lazarus used a phishing email that spoofed Celas LLC and lured victims into downloading a malicious program named Celas Trade Pro from the actor-controlled site <em>celasllc[.]com<\/em>. The program was a trojanized version of the legitimate cryptocurrency trading application, Q.T. Bitcoin Trader. The fake website allowed the victim to download either the Windows or MacOS version of the application.<\/p>\n<p>When the user executed the Celas Trade Pro program, it installed and ran an embedded executable called <em>Updater.exe,<sup>4<\/sup><\/em> which collected victim host information, then encrypted the data with with a hard-coded XOR key (<em>Moz&amp;Wie;#t\/6T!2y<\/em>), prepended the encrypted data with the image header \u201cGIF89a,\u201d and finally sent the data to its command and control (C&amp;C) server, <em>celasllc[.]com\/checkupdate[.]php<\/em>. Celas Trade Pro eventually downloaded and installed FALLCHILL, a remote access trojan (RAT) attributed to North Korea by the U.S. government, inside the victim\u2019s network.<\/p>\n<p>From 29 May 2018 to 23 January 2021, the <em>celasllc[.]com<\/em> domain resolved to nine IPv4 addresses.<\/p>\n<h4>2.4.\u00a0 AppleJeus Version 2: JMT Trading<\/h4>\n<p>Kaspersky discovered this campaign with a new version of AppleJeus in October 2019, due to similarities to the original malware. The campaign continued to be active until at least January 2021, although on 11 October 2019, the files on GitHub were updated to clean, non-malicious installers soon after Kaspersky tweeted about it.<\/p>\n<p>In this campaign, a fake but legitimate-appearing cryptocurrency trading company called JMT Trading marketed a trojanized application on its website <em>jmttrading[.]org.<\/em> Users were able to download either a Windows or MacOS-supported version via a link to the company\u2019s GitHub page. The download included a ZIP archive and TAR files containing the malware source code.<\/p>\n<p>When a user executed the JMT Trading application, it installed and ran an embedded and heavily-obfuscated executable named <em>CrashReporter.exe,<sup>5<\/sup><\/em> which collected victim host information and encrypted the data with a hard-coded XOR key (<em>X,%`PMk&#8211;Jj8s+6=15:20:11<\/em>). The malware then sent the encrypted information to its C&amp;C server, <em>https[:]\/\/beastgoc.com\/grepmonux.php,<\/em> with a multipart form data separator (<em>&#8211;wMKBUqjC7ZMG5A5g<\/em>). Unlike the Windows version, the MacOS installer did not have a digital certificate and thus warned the user before installation.<\/p>\n<p>From 15 October 2016 to 22 January 2021, the <em>jmttrading[.]org<\/em> domain resolved to 14 IPv4 addresses.<\/p>\n<h4>2.5.\u00a0 AppleJeus Version 3: Union Crypto<\/h4>\n<p>Two months after discovering the JMT Trading campaign above, Kaspersky found another new version of AppleJeus in December 2019 on Twitter. This malware version appears similar to another cryptocurrency application known as Blackbird Bitcoin Arbitrage and may even be a modification of this application. This version follows the previous AppleJeus versions\u2019 pattern of imitating a legitimate cryptocurrency trading application, in this case Union Crypto, to market and distribute malware on the website <em>unioncrypto[.]vip. <\/em>Also similar to the previous versions, this one supports both Mac OS and Windows platforms. Through a VirusTotal report, a researcher found a download link (<em>https:\/\/www.unioncrypto[.]vip\/download\/W6c2dq8By7luMhCmya2v97YeN<\/em>) for the MacOS version of Union Crypto Trader. The open source community also found that the Windows version may have been distributed via the instant messaging service Telegram.<\/p>\n<p>The Windows version consisted of an executable file that extracted a temporary MSI installer that dropped an embedded executable called <em>UnionCryptoUpdater.exe.<sup>6<\/sup><\/em> This executable installed itself as a service with a description stating it &#8220;Automatically installs updates for Union Crypto Trader.&#8221; It was set to run every time the user logged in, then collected the system information, combining it into a string that was MD5 hashed and stored in the <em>auth_signature<\/em> variable before sending it to its C&amp;C server <em>https[:]\/\/unioncrypto[.]vip\/update<\/em>.<\/p>\n<p>As with the previous version, the installer for MacOS had similar functionality to the Windows version, but it lacked a digital certificate and so the system will warn the user of that before installation.<\/p>\n<p>From 5 June 2019 to 15 July 2020, the <em>unioncrypto[.]vi<\/em>p domain resolved to five different IPv4 addresses.<\/p>\n<h4>2.6.\u00a0 AppleJeus Version 4: Kupay Wallet<\/h4>\n<p>Several months later, on 13 March 2020, researchers found another version of AppleJeus on <em>kupaywallet[.]com,<\/em> the website of the fake but legitimate-appearing cryptocurrency company named Kupay Wallet. It appeared to be active until at least January 2021, and following the pattern of supporting both Windows and MacOS platforms.<\/p>\n<p>Once the the malware runs its executable (<em>Kupay.exe<\/em>), an embedded executable (<em>KupayUpgrade.exe)<sup>7<\/sup><\/em> is extracted and executed. It installs itself as a service (&#8220;Automatic Kupay Upgrade&#8221;) to run every time the user logs on, then collects victim system information, which is combined into strings and sent to the C&amp;C server <em>https[:]\/\/kupaywallet[.]com\/kupay_update.php<\/em>. The Kupay Wallet malware is also capable of reading and writing files, as well as executing additional commands via the terminal.<\/p>\n<p>This version is very similar to a legitimate open source cryptocurrency wallet known as Copay, which is distributed by the Atlanta-based company BitPay. Kupay appears to be a modification of this application, containing BitPay as the company listed in its version information, as well as sending a DNS request to <em>bitpay[.]com<\/em> following a request to its own domain.<\/p>\n<p>From 20 March 2020, to 16 January 2021, the <em>kupaywallet[.]com<\/em> domain resolved to one IPv4 address.<\/p>\n<h4>2.7.\u00a0 AppleJeus Version 5: CoinGoTrade<\/h4>\n<p>Researchers found the fifth version of AppleJeus<sup>8<\/sup> on the website for another fake cryptocurrency wallet called CoinGoTrade (<em>coingotrade[.]com<\/em>).<\/p>\n<p>Following the previous patterns, CoinGoTrade was available for both Windows and MacOs. Once the user downloaded the executable, <em>CoinGoTradeUpdate.exe<sup>9<\/sup><\/em> installed itself as a service (&#8220;Automatic CoinGoTrade Upgrade&#8221;) to run every time the user logged on, collected victim system information, combined the information into strings and sent it to one of its C&amp;C servers.<\/p>\n<p>From February 28, 2020, to January 23, 2021, <em>coingotrade[.]com<\/em> resolved to one internet IPv4 address.<\/p>\n<h4>2.8.\u00a0 AppleJeus Version 6: Dorusio<\/h4>\n<p>The sixth version of AppleJeus was also identified In March 2020. It was marketed and distributed by a fake but legitimate-looking company called Dorusio, on <em>dorusio[.]com<\/em>. It is a trojanized version of Copay, and apart from the Dorusio logo and two additional services, the wallet appears to be the same as the Kupay Wallet, and was available for both Windows and MacOS.<\/p>\n<p>Once the executable ran, the DorusioUpgrade.exe<sup>10<\/sup> executable followed the same steps as other versions: it installed itself as a service (&#8220;Automatic Dorusio Upgrade&#8221;) to run every time the user logged on, collected victim system information, combined the information in strings and sent it to one of its C&amp;C servers.<\/p>\n<p>From 30 March 2020 to 23 January 2021 <em>dorusio[.]com<\/em> resolved to one internet IPv4 address.<\/p>\n<h4>2.9.\u00a0 AppleJeus Version 7: Ants2Whale<\/h4>\n<p>In late 2020, a new version of AppleJeus was identified that was marketed and distributed by a legitimate-looking company called Ants2Whale on their website, <em>ants2whale[.]com<\/em>. In this case, the website contained many grammatical errors indicating that the author was not likely a native English speaker. The website also stated the user must contact the website administrators to download Ants2Whale because it is a premium package.<\/p>\n<p>Following the previous patterns, Ants2Whale was available for both Windows and MacOS; however, only the MacOS version was available for analysis. Analysis of the MacOS version confirmed that Ants2Whale<sup>11<\/sup> used the same techniques described in previous versions.<\/p>\n<p>From 23 September 2020 to 22 January 2021 <em>ants2whale[.]com<\/em> domain resolved to one IPv4 address.<\/p>\n<h3>3.\u00a0 Prevention and Mitigation<\/h3>\n<p>According to CISA, organizations whose networks have been infected by AppleJeus should immediately take these initial actions:<\/p>\n<ul>\n<li>Contact the FBI, CISA, or Treasury<sup>12<\/sup> immediately regarding any identified activity related to AppleJeus.<\/li>\n<li>Initiate an incident response plan.<\/li>\n<li>Create new keys for wallets, and\/or move cryptocurrency to new wallets.<\/li>\n<li>Introduce a two-factor authentication solution as an extra layer of verification.<\/li>\n<li>Use hardware wallets, which keep the private keys in a separate, secured storage area.<\/li>\n<li>Move funds out of a compromised wallet. Do not use the malware listed in this advisory to transfer funds, and form all transactions offline and then broadcast them to the network all at once in a short online session, ideally prior to the attacker accessing them.<\/li>\n<li>Isolate impacted hosts from the network and reimage them.<\/li>\n<li>Assume the threat actors have moved laterally within the network and downloaded additional malware. Create isolated subnets to block any communication between possible impacted hosts and the rest of the network.<\/li>\n<li>Change all passwords to any accounts associated with impacted hosts. Ensure that there is no future credential reuse.<\/li>\n<li>Install anti-virus software to run daily deep scans of the host and keep them updated with the latest signatures daily.<\/li>\n<li>Install a Host Based Intrusion Detection (HIDS)-based software and keep it up-to-date.<\/li>\n<li>Ensure all software and hardware is up-to-date, and all patches have been installed. Follow the principle of least privilege, to reduce the risk surface of various assets.<\/li>\n<li>Ensure the network-based firewall is installed and\/or up-to-date, and apply appropriate firmware upgrades on a regular basis.<\/li>\n<\/ul>\n<p>To mitigate and reduce the risk of being affected by AppleJeus, consider the following recommendations:<\/p>\n<h4>3.1\u00a0 Cryptocurrency Users<\/h4>\n<ul>\n<li>Verify the source of cryptocurrency-related applications and avoid installing applications downloaded from the Internet without confirming its legitimacy.<\/li>\n<li>Use multiple wallets for key storage, splitting the cryptocurrency appropriately between cold and hot storage.<\/li>\n<li>Enable multi-factor authentication for both user and device verification. Pay special attention to any suspicious logins.<\/li>\n<li>Prioritise cryptocurrency service businesses that offer indemnity protections for lost or stolen cryptocurrency.<\/li>\n<li>Consider having a dedicated device for cryptocurrency management. Hardware wallets offer an extra layer of protection by keeping the keys separately.<\/li>\n<li>Rotate credentials regularly and use unique strong passwords for each service.<\/li>\n<\/ul>\n<h4>3.2\u00a0 Financial Service Companies<\/h4>\n<ul>\n<li>Verify compliance with Federal Financial Institutions Examination Council (FFIEC) handbooks.<sup>13<\/sup><\/li>\n<li>Report suspicious cyber and financial activities.<\/li>\n<\/ul>\n<h4>3.3\u00a0 Cryptocurrency Businesses<\/h4>\n<ul>\n<li>Comply with the Cryptocurrency Security Standard.<sup>14<\/sup><\/li>\n<\/ul>\n<h4>3.4\u00a0 All Organizations<\/h4>\n<ul>\n<li>Add the listed IOCs in the table below to intrusion detection systems and security alert systems to block and report any suspicious activity.<\/li>\n<li>Maintain a proper security policy and stay vigilant through official authorities channels and security vendors for any updates regarding this threat actor.<\/li>\n<\/ul>\n<h3>4.\u00a0 Indicators of Compromise<\/h3>\n<p>Below is a list of known IOCs related to this attack.<\/p>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\"><strong>Indicator<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"190\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">5e54bccbd4d93447e79cda0558b0b308a186c2be571c739e5460a3cb6ef665c0<\/p>\n<p style=\"text-align: center;\">6ee19085ad5c17f989616d17ef68041910b3d0cbcf7e08cc7d7c1a1cb09e6b69<\/p>\n<p style=\"text-align: center;\">A84ed8ce714dff76b48b26414de9f045de561146d7eaa09019cbfbb2586c9765<\/p>\n<p style=\"text-align: center;\">Bdff852398f174e9eef1db1c2d3fefdda25fe0ea90a40a2e06e51b5c0ebd69eb<\/p>\n<p style=\"text-align: center;\">C0c2239138b9bc659b5bddd8f49fa3f3074b65df8f3a2f639f7c632d2306af70<\/p>\n<p style=\"text-align: center;\">d404c0a634cef0d32029286fde8efccb6dfe1809066bbec7ac32d42c5ce3bc04<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"190\">SHA-256 hashes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"482\">celasllc[.]com<\/p>\n<p>45[.]199[.]63[.]220<\/p>\n<p>107[.]187[.]66[.]103<\/p>\n<p>145[.]249[.]106[.]19<\/p>\n<p>175[.]29[.]32[.]160<\/p>\n<p>185[.]142[.]236[.]213<\/p>\n<p>185[.]181[.]104[.]82<\/p>\n<p>198[.]251[.]83[.]27<\/p>\n<p>208[.]91[.]197[.]46<\/p>\n<p>209[.]99[.]64[.]18<\/p>\n<p>celasllc[.]com\/checkupdate[.]php<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 1 domain, IP addresses and C&amp;Cs<\/p>\n<p style=\"text-align: center;\">\n<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">jmttrading[.]org<\/p>\n<p style=\"text-align: center;\">45[.]33[.]2[.]79<\/p>\n<p style=\"text-align: center;\">45[.]33[.]23[.]183<\/p>\n<p style=\"text-align: center;\">45[.]56[.]79[.]23<\/p>\n<p style=\"text-align: center;\">\u00a0\u00a0\u00a0\u00a0\u00a0 45[.]79[.]19[.]196<\/p>\n<p style=\"text-align: center;\">96[.]126[.]123[.]244<\/p>\n<p style=\"text-align: center;\">146[.]112[.]61[.]107<\/p>\n<p style=\"text-align: center;\">184[.]168[.]221[.]40<\/p>\n<p style=\"text-align: center;\">184[.]168[.]221[.]57<\/p>\n<p style=\"text-align: center;\">198[.]187[.]29[.]20<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]197<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]198<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]199<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]200<\/p>\n<p style=\"text-align: center;\">198[.]58[.]118[.]167<\/p>\n<p style=\"text-align: center;\">http:\/\/beastgoc[.]com\/grepmonux[.]php<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"190\">AppleJeus Version 2 domain, IP addresses and C&amp;Cs<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">unioncrypto[.]vip<\/p>\n<p style=\"text-align: center;\">104[.]168[.]167[.]16<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]197<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]198<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]199<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]200<\/p>\n<p style=\"text-align: center;\">https:\/\/www[.]unioncrypto[.]vip\/download\/W6c2dq8By7luMhCmya2v97YeN<\/p>\n<p style=\"text-align: center;\">https:\/\/unioncrypto[.]vip\/update<\/p>\n<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 3 domain, IP addresses and C&amp;Cs<\/p>\n<p style=\"text-align: center;\">\n<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">01c13f825ec6366ac2b6dd80e5589568fa5c8685cb4d924d1408e3d7c178902f (UnionCryptoUpdater.exe)<\/p>\n<p style=\"text-align: center;\">0967d2f122a797661c90bc4fc00d23b4a29f66129611b4aa76f62d8a15854d36 (UnionCryptoTrader.exe)<\/p>\n<p style=\"text-align: center;\">2ab58b7ce583402bf4cbc90bee643ba5f9503461f91574845264d4f7e3ccb390 (UnionCryptoTrader.dmg)<\/p>\n<p style=\"text-align: center;\">631ac269925bb72b5ad8f469062309541e1edfec5610a21eecded75a35e65680 (unioncryptoupdater)<\/p>\n<p style=\"text-align: center;\">6f45a004ad6bb087f733feb618e115fe88164f6db9562cb9b428372c9add75f0 (UnionCryptoTrader)<\/p>\n<p style=\"text-align: center;\">755bd7a3765efceb8183ffade090ef2637a85c4505f8078dda116013dd5758f3 (NodeDLL.dll)<\/p>\n<p style=\"text-align: center;\">af4144c1f0236e6b59f40d88635ec54c2ef8034f6a96a83f5dbfd6b8ea2c0d49 (UnionCryptoTrader.msi)<\/p>\n<p style=\"text-align: center;\">e3623c2440b692f6b557a862719dc95f41d2e9ad7b560e837d3b59bfe4b8b774 (UnionCryptoSetup.exe)<\/p>\n<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 3 file hashes<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">kupaywallet[.]com<\/p>\n<p style=\"text-align: center;\">104[.]200[.]67[.]96<\/p>\n<p style=\"text-align: center;\">https:\/\/kupaywallet[.]com\/kupay_update.php<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"190\">AppleJeus Version 4 domain, IP addresses and C&amp;C<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"482\">0bc7517aa2f0c1820ced399bfd66b993f10ad77e8d72727b0f3dc1ca35cad7ba (kupay_upgrade)<\/p>\n<p>1b60a6d35c872102f535ae6a3d7669fb7d55c43dc7e73354423fdcca01a955d6<\/p>\n<p>(Kupay.exe)<\/p>\n<p>91eaf215be336eae983d069de16630cc3580e222c427f785e0da312d0692d0fd<\/p>\n<p>(kupayupdate_stage2)<\/p>\n<p>a0c461c94ba9f1573c7253666d218b3343d24bfa5d8ef270ee9bc74b7856e492 (kupay)<\/p>\n<p>fc1aafd2ed190fa523e60c3d22b6f7ca049d97fc41c9a2fe987576d6b5e81d6d (KupayUpgrade.exe)<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 4 file hashes<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">coinGoTrade[.]com<\/p>\n<p style=\"text-align: center;\">198.54.114[.]175<\/p>\n<p style=\"text-align: center;\">https:\/\/airbseeker[.]com\/rediret[.]php<\/p>\n<p style=\"text-align: center;\">https:\/\/globalkeystroke[.]com\/pockbackx[.]php<\/p>\n<p style=\"text-align: center;\">https:\/\/www[.]woodmate[.]it\/administrator\/help\/en-GB\/bins\/tags\/taghelper[.]php<\/p>\n<p style=\"text-align: center;\">23[.]152[.]0[.]101<\/p>\n<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 5 domain, IP addresses and C&amp;Cs<\/p>\n<p style=\"text-align: center;\">\n<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">326d7836d580c08cf4b5e587434f6e5011ebf2284bbf3e7c083a8f41dac36ddd (CoinGoTradeUpgradeDaemon)<\/p>\n<p style=\"text-align: center;\">3e5442440aea07229a1bf6ca2fdf78c5e2e5eaac312a325ccb49d45da14f97f4 (CoinGoTrade.exe)<\/p>\n<p style=\"text-align: center;\">527792dfab79f026eaa6930d2109c93e816ed31826dba0338a9223db71aced18 (CoinGo_Trade)<\/p>\n<p style=\"text-align: center;\">572a124f5665be68eaa472590f3ba75bf34b0ea2942b5fcbfd3e74654202dd09 (CoinGoTradeUpdate.exe)<\/p>\n<p style=\"text-align: center;\">5e40d106977017b1ed235419b1e59ff090e1f43ac57da1bb5d80d66ae53b1df8 (prtspool)<\/p>\n<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 5 file hashes<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">dorusio[.]com<\/p>\n<p style=\"text-align: center;\">198[.]54[.]115[.]51<\/p>\n<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 6 domain and IP addresses<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">21afaceee5fab15948a5a724222c948ad17cad181bf514a680267abcce186831 (DorusioUpgrade.exe)<\/p>\n<p style=\"text-align: center;\">78b56a1385f2a92f3c9404f71731088646aac6c2c84cc19a449976272dab418f (Dorusio.exe)<\/p>\n<p style=\"text-align: center;\">a0c461c94ba9f1573c7253666d218b3343d24bfa5d8ef270ee9bc74b7856e492 (Dorusio)<\/p>\n<p style=\"text-align: center;\">dcb232409c799f6ddfe4bc0566161c2d0b372db6095a0018e6059e34c2b79c61 (dorusio_upgrade)<\/p>\n<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 6 file hashes<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"482\">\n<p style=\"text-align: center;\">ants2whale[.]com<\/p>\n<p style=\"text-align: center;\">198[.]54[.]114[.]237<\/p>\n<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">AppleJeus Version 7 domain and IP addresses<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"482\">bb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694 (Ants2WhaleHelper)<\/p>\n<p>d5ac680e14b013e0624470da7f46e84809d00b59a7544f6a42b110cf0e29254e (Ants2Whale)<\/td>\n<td width=\"190\">\n<p style=\"text-align: center;\">\u00a0AppleJeus Version 7 file hashes<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1><\/h1>\n<h3>Endnotes<\/h3>\n<ol>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-048a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-048a<\/a><\/li>\n<li><a href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/threat-intelligence-report-hidden-cobra.pdf\">https:\/\/www.infoblox.com\/wp-content\/uploads\/threat-intelligence-report-hidden-cobra.pdf<\/a><\/li>\n<li><a href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\">https:\/\/securelist.com\/operation-applejeus\/87553\/<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048a\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048a<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048b\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048b<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048c\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048c<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048d\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048d<\/a><\/li>\n<li>The alert <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-048a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-048a<\/a> gives a discovery timeframe of \u201cearly 2020;\u201d however, the report <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048e\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048e<\/a> lists the discovery timeframe of October 2020.<\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048e\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048e<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048f\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048f<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048f\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-048f<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/contact-us\">https:\/\/us-cert.cisa.gov\/contact-us<\/a><\/li>\n<li><a href=\"https:\/\/ithandbook.ffiec.gov\/\">https:\/\/ithandbook.ffiec.gov\/<\/a><\/li>\n<li><a href=\"http:\/\/cryptoconsortium.github.io\/CCSS\/\">http:\/\/cryptoconsortium.github.io\/CCSS\/<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Victor Sandin and Christopher Kim TLP: WHITE 1.\u00a0 Executive Summary On 17 February, the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Treasury (Treasury) published a joint report to highlight the cyber threat posed to cryptocurrency by North Korea, formally known as the Democratic People\u2019s Republic of [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6727,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[446,339,445,312,260],"class_list":{"0":"post-6050","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-applejeus","9":"tag-apt","10":"tag-cryptocurrency","11":"tag-hidden-cobra","12":"tag-trojan","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats<\/title>\n<meta name=\"description\" content=\"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats. On 17 February, the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau ofInvestigation (FBI), and the Department of Treasury (Treasury) published a joint report to highlight the cyber threat posed to cryptocurrency by North Korea, formally known as the Democratic People\u2019s Republic of Korea (DPRK); the report also provides mitigation recommendations and indicators of compromise for detection.1 The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats. On 17 February, the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau ofInvestigation (FBI), and the Department of Treasury (Treasury) published a joint report to highlight the cyber threat posed to cryptocurrency by North Korea, formally known as the Democratic People\u2019s Republic of Korea (DPRK); the report also provides mitigation recommendations and indicators of compromise for detection.1 The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-23T21:10:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats\",\"datePublished\":\"2021-02-23T21:10:34+00:00\",\"dateModified\":\"2024-04-26T20:20:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/\"},\"wordCount\":2811,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"keywords\":[\"AppleJeus\",\"apt\",\"cryptocurrency\",\"hidden cobra\",\"Trojan\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/\",\"name\":\"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"datePublished\":\"2021-02-23T21:10:34+00:00\",\"dateModified\":\"2024-04-26T20:20:53+00:00\",\"description\":\"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats. On 17 February, the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau ofInvestigation (FBI), and the Department of Treasury (Treasury) published a joint report to highlight the cyber threat posed to cryptocurrency by North Korea, formally known as the Democratic People\u2019s Republic of Korea (DPRK); the report also provides mitigation recommendations and indicators of compromise for detection.1 The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"width\":612,\"height\":343,\"caption\":\"Cyber crime abstract concept. 3D shape and contour of skull icon on digital background. Computer attack and digital pirate symbol animation.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats","description":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats. On 17 February, the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau ofInvestigation (FBI), and the Department of Treasury (Treasury) published a joint report to highlight the cyber threat posed to cryptocurrency by North Korea, formally known as the Democratic People\u2019s Republic of Korea (DPRK); the report also provides mitigation recommendations and indicators of compromise for detection.1 The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats","og_description":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats. On 17 February, the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau ofInvestigation (FBI), and the Department of Treasury (Treasury) published a joint report to highlight the cyber threat posed to cryptocurrency by North Korea, formally known as the Democratic People\u2019s Republic of Korea (DPRK); the report also provides mitigation recommendations and indicators of compromise for detection.1 The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/","og_site_name":"Infoblox Blog","article_published_time":"2021-02-23T21:10:34+00:00","article_modified_time":"2024-04-26T20:20:53+00:00","og_image":[{"width":612,"height":343,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats","datePublished":"2021-02-23T21:10:34+00:00","dateModified":"2024-04-26T20:20:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/"},"wordCount":2811,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","keywords":["AppleJeus","apt","cryptocurrency","hidden cobra","Trojan"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/","name":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","datePublished":"2021-02-23T21:10:34+00:00","dateModified":"2024-04-26T20:20:53+00:00","description":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats. On 17 February, the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau ofInvestigation (FBI), and the Department of Treasury (Treasury) published a joint report to highlight the cyber threat posed to cryptocurrency by North Korea, formally known as the Democratic People\u2019s Republic of Korea (DPRK); the report also provides mitigation recommendations and indicators of compromise for detection.1 The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","width":612,"height":343,"caption":"Cyber crime abstract concept. 3D shape and contour of skull icon on digital background. Computer attack and digital pirate symbol animation."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-hidden-cobra-applejeus-cryptocurrency-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Advisory: HIDDEN COBRA: AppleJeus Cryptocurrency Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6050"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6050\/revisions"}],"predecessor-version":[{"id":6062,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6050\/revisions\/6062"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6727"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}