<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>TinkaOTP.app — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/tinkaotp.app/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 23 Jan 2024 17:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/tinkaotp.app/feed.xml" rel="self" type="application/rss+xml"/><item><title>Lazarus Group's Dacls RAT Targets macOS</title><link>https://feed.craftedsignal.io/briefs/2024-01-dacls-macos/</link><pubDate>Tue, 23 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dacls-macos/</guid><description>The Lazarus Group is distributing a new variant of the Dacls RAT targeting macOS systems via a trojanized application, installing a hidden executable and attempting persistence.</description><content:encoded><![CDATA[<p>The Lazarus Group, a North Korean APT, is actively distributing a new variant of the Dacls RAT targeting macOS systems. This malware is delivered via a trojanized application named TinkaOTP.app, mimicking previous social engineering tactics employed by the group. Discovered in May 2020, the macOS variant of Dacls RAT shares similarities with its Windows/Linux counterparts, suggesting a cross-platform campaign. Upon execution, the malware installs a hidden executable in the user&rsquo;s Library directory and attempts to establish persistence as a launch agent. The macOS variant exhibits a failed persistence mechanism due to a directory check bug. Researchers speculate potential exploitation of CVE-2019-3396, a Confluence vulnerability, aligning with findings alongside the Windows/Linux version. The Lazarus Group continues to evolve its macOS malware, necessitating proactive detection and response measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user downloads and mounts the malicious TinkaOTP.dmg disk image.</li>
<li>The user executes the TinkaOTP.app application.</li>
<li>TinkaOTP.app executes <code>/bin/cp</code> to copy <code>/Volumes/TinkaOTP/TinkaOTP.app/Contents/Resources/Base.lproj/SubMenu.nib</code> to <code>~/Library/.mina</code>.</li>
<li>TinkaOTP.app executes <code>chmod +x ~/Library/.mina</code> to set the executable bit on the copied file.</li>
<li>TinkaOTP.app executes the copied file <code>~/Library/.mina</code>.</li>
<li><code>~/Library/.mina</code> attempts to create a launch agent file at <code>/Library/LaunchAgents/com.aex.lop.agent.plist</code>.</li>
<li>The persistence attempt fails because the <code>/Library/LaunchAgents</code> directory does not exist by default.</li>
<li>The RAT establishes command and control with its operators (details not available in source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the installation of a remote access trojan (RAT) on the victim&rsquo;s macOS system, granting the Lazarus Group unauthorized access. The malware can potentially exfiltrate sensitive data, execute arbitrary commands, and perform other malicious activities. The scope of targeting is currently unknown, but the Lazarus Group has historically targeted financial institutions and cryptocurrency exchanges. The failed persistence mechanism in this variant might limit the long-term impact unless other persistence methods are employed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for executions of <code>/bin/cp</code> copying files to the user&rsquo;s Library directory, especially with the destination <code>.mina</code>, using the &ldquo;Detect Dacls RAT Installation&rdquo; Sigma rule.</li>
<li>Monitor process creations for executions of the hidden executable <code>~/Library/.mina</code> using the &ldquo;Detect Dacls RAT Executable&rdquo; Sigma rule.</li>
<li>Inspect network connections from non-standard applications to external IPs (requires further analysis to build a rule for this specific threat).</li>
<li>Block the identified malicious file hashes (SHA256) from the IOC list at the network and endpoint levels.</li>
<li>If running Atlassian Confluence, patch CVE-2019-3396 to prevent potential initial access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>macos</category><category>rat</category><category>lazarus group</category></item></channel></rss>