April 6, 2021 By David Bisson 3 min read

Digital attackers used a strain of crypto malware called ‘AppleJeus’ to steal cryptocurrency.

In a joint advisory published by the FBI and the Department of the Treasury, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) warned that the Hidden Cobra threat group was using AppleJeus to target cryptocurrency exchanges, finance service companies and similar entities.

The malicious actors used trojanized versions of cryptocurrency trading apps to spread the crypto malware. From there, they could prey upon businesses and steal cryptocurrency from specific users’ wallets.

Read on to learn about the many times AppleJeus has appeared over the past few years.

The Seven Known Faces of AppleJeus

CISA used open-source techniques and other means to spot seven instances of Hidden Cobra’s AppleJeus crypto malware.

The first version emerged in August 2018. A version of a cryptocurrency trading app bearing the trojan infected an undisclosed victim’s computer. Bearing the name Celas Trade Pro, AppleJeus infected the victim with FALLCHILL. This remote administration tool let attackers remotely issue commands using a command-and-control server.

Next, CISA found that a phishing email from an LLC company had helped to distribute the trojan in the app.

The second instance of AppleJeus arrived more than a year later, in October 2019. At that time, a company called ‘JMT Trading’ marketed and spread the crypto malware. They claimed it was a cryptocurrency trading app. A download button on the website linked to the company’s GitHub page. There, victims could download the Windows and macOS versions of the crypto malware.

Crypto Malware Hides in Fake Trading Apps

Later that same year, a cybersecurity company formally detected the third iteration of AppleJeus. This time it was hiding inside a cryptocurrency trading app pushed out by a company called ‘Union Crypto’. The researchers did not spot any download links on the company’s website at the time of their work. However, a malware researcher discovered a download link that led to the macOS version. Meanwhile, open-source reporting suggested that the Windows version might have spread on Telegram channels.

The fourth version of the crypto malware arrived in March 2020. As with the cases described above, the malware relied on a fake company for distribution — Kupay Wallet, in this instance. The fake company’s domain used a valid SSL certificate at the time of the research. This might have been an attempt to lull visitors into a false sense of safety. But the certificate was only domain-control validated. That means the domain owners didn’t need to validate their identity or the actual business’s existence.

Two other fake companies called ‘CoinGoTrade’ and ‘Dorusio’ pushed out apps containing AppleJeus crypto malware at around the same time. Both of those entities also used a domain control validated SSL certificate, though the download links for the Dorusio variant resulted in 404 error messages at the time of analysis.

How to Defend Against Crypto Malware Like AppleJeus

In the first few months of 2020, Hidden Cobra used their crypto malware to target business entities and specific users in over 30 countries spread across five continents. These findings highlight the need for groups to defend themselves against crypto malware like AppleJeus. CISA recommended that they begin by investing in security awareness training that uses test attacks to educate their users about social engineering, spearphishing emails and other common digital threats.

CISA also noted that groups should consider using the principle of least privilege to limit the rights user accounts have. They should also patch vectors where threat actors might escalate their privilege in the system.

If you suspect your business has an AppleJeus crypto malware infection, there are some things you can do. CISA advised that you activate your incident response plans, remove any affected hosts from the network and contact the FBI, CISA or Department of the Treasury.

More from News

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally. The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets. Who is exploiting the NGFW zero-day? As of now, little is known about the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today