Hackers using fake crypto app to install to install the AppleJeus malware

December 5, 2022

Hackers backed by North Korea’s government attempted to infect the computers of hundreds of people working in a variety of industries, including news media, IT, cryptocurrency, and financial services, Google said. It added that it is being used to install the AppleJeus malware for initial access to networks and steal crypto assets.

The vulnerability, identified as CVE-2022-0609, was exploited by two distinct North Korean hacking groups. Both groups used the same exploit kit on websites that were either legitimate organizations that had been hacked or were set up specifically to serve attack code to unsuspecting visitors. One group was called Operation Dream Job, and it targeted over 250 people from ten different companies. AppleJeus, the other group, targeted 85 users.

The website was used by the attackers to distribute a Windows MSI installer disguised as the BloxHolder app, which was used to install AppleJeus malware alongside the QTBitcoin Trader app.

The BloxHolder application was discovered to be installed alongside the open-source cryptocurrency trading application QTBitcoin Trader, which is available on GitHub.

The MSI file is used to simultaneously install malicious and legitimate applications. The researchers observed the Lazarus Group installing AppleJeus in October 2022 using a weaponized Microsoft Office document named ‘OKX Binance & Huobi VIP fee comparision.xls’ rather than an MSI installer.

AppleJeus will create a scheduled task and drop additional files in the folder “%APPDATA%RoamingBloxholder” after installation via the MSI infection chain. The malware will then collect the MAC address, computer name, and OS version and send it to the C2 via a POST request, most likely to determine whether it is running on a virtual machine or sandbox.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

February 15, 2026 Ghost tapping scams are emerging as a new threat as tap-to-pay technology becomes more widespread. Unlike traditional more...

February 13, 2026 Cybersecurity researchers have uncovered a malicious Google Chrome extension designed to steal sensitive data from Meta Business more...

February 5, 2026 A security researcher at Koi named Oren Yomtov has uncovered a widespread malware operation embedded inside an more...

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn