When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

It is attributed with some of the biggest crypto heists in history.

Usually, the group would groom their victims on social media, before deploying any malware.

Hacker silhouette working on a laptop with North Korean flag on the background

In this campaign, however, theyve decided for a more direct approach.

The name is taken from a genuine academic paper from the University of Texas, the researchers added.

The entire campaign is thus named Hidden Risk.

The malware comes in multiple stages.

It only works on macOS devices, running onIntelor Apple silicon, with the Rosetta emulation framework.

The campaign has been active for at least a year, the researchers said.

ViaBleepingComputer

You might also like