Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hook, Line and Koi Stealer - New macOS Malware in DPRK Fake Job Interviews

Objective-See Foundation via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a detailed cybersecurity investigation into North Korean state-sponsored malware targeting macOS systems through sophisticated social engineering campaigns. Learn how DPRK-linked threat actors impersonate legitimate tech industry recruiters to conduct fake job interviews, specifically targeting software developers in the cryptocurrency sector. Discover the analysis of a previously undocumented macOS variant of Koi Stealer malware that demonstrates advanced capabilities including AppleScript-based command execution, persistence mechanisms, and separate memory streams for command and control communication. Examine the methodologies used to link this macOS strain to its Windows counterpart through TTP correlation, code similarity analysis, and infrastructure pivoting techniques. Understand how researchers traced C2 infrastructure to connect this campaign with previously known North Korean operations and established attribution to DPRK-aligned threat actors. Gain insights into the evolution of nation-state malware from Windows-only targeting to cross-platform capabilities, and learn about the sophisticated tactics employed in modern cyber espionage campaigns targeting the technology and cryptocurrency industries.

Syllabus

OBTS v8: “Hook, Line & Koi Stealer: New macOS Malware in DPRK Fake Job Interviews” A Gabay & D Frank

Taught by

Objective-See Foundation

Reviews

Start your review of Hook, Line and Koi Stealer - New macOS Malware in DPRK Fake Job Interviews

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.