Lazarus Hides Malware Loaders in Git Hooks During Developer-Targeting Attacks on May 9

According to OpenSourceMalware research, North Korean hacking group Lazarus hid second-stage loaders in Git Hooks pre-commit scripts during developer-targeting attacks on May 9. The group used the technique in campaigns including ‘Infectious Interview,’ where it posed as cryptocurrency and DeFi recruiters to trick developers into cloning malicious code repositories, ultimately aiming to steal crypto assets and credentials.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

LayerZero Issues Public Apology for Kelp DAO Exploit, Admits Single-Verifier Setup Fault

According to The Block, LayerZero issued a public apology Friday for its handling of the April 18 exploit that drained $292 million in rsETH from Kelp DAO's cross-chain bridge. The protocol acknowledged it made a mistake by allowing its Decentralized Verifier Network to serve as the sole verifier fo

GateNews2h ago

Crypto Wrench Attacks Rise 41% in 2026, Targeting Family Members

Crypto security firm CertiK estimates that cryptocurrency holders lost approximately $101 million from wrench attacks during the first four months of 2026, representing a 41% increase in verified incidents compared to the same period in 2025. If the trend continues at this rate, losses could reach s

CryptoFrontier3h ago

Linux "Copy Fail" Vulnerability Listed by CISA; 10-Line Code Enables Root Privilege Escalation

According to BlockBeats, on May 9, the Linux kernel "Copy Fail" vulnerability was added to CISA's Known Exploited Vulnerabilities (KEV) catalog. The flaw affects major Linux distributions since 2017 and allows attackers with regular user permissions to escalate to root access using

GateNews4h ago

Chrome Automatically Downloads Multi-Gigabyte Gemini Nano AI Model on May 9, Sparks Crypto Community Security Concerns

According to BlockBeats, on May 9, Chrome automatically downloaded a multi-gigabyte AI model file (Gemini Nano) to users' devices without explicit consent for local fraud detection, webpage summarization, and AI features. While Google stated that local AI execution enhances privacy and security,

GateNews4h ago

Crypto Wrench Attacks Surge in 2026, with $101M Lost in First Four Months, CertiK Reports

According to CertiK, crypto wrench attacks—physical assaults and extortion targeting cryptocurrency holders—have resulted in approximately $101 million in losses during the first four months of 2026. The firm verified 34 incidents globally, representing a 41% increase compared to the same period in

GateNews4h ago

Wasabi Protocol Suffers $5.7M Loss to Spring Boot Actuator Misconfiguration on May 9

Wasabi Protocol disclosed a security incident today (May 9) in which attackers exploited a Spring Boot Actuator misconfiguration in its AWS infrastructure to steal private keys controlling EVM smart contracts. The breach resulted in approximately $4.8 million in user funds and $900,000 in protocol r

GateNews8h ago
Comment
0/400
No comments