Security Researcher, Global Research & Analysis Team
Dmitry Galov is responsible for researching non-Windows malware, APTs, and IoT-threats. He joined Kaspersky in September 2015 and became part of GReAT in August 2018. Dmitry has always been interested in programming and reverse-engineering and started participating in different international competitions while still at high school. Nowadays, Dmitry is an experienced specialist with an in-depth knowledge of Android malware.This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.
We recently discovered a Trojanized DeFi application that was compiled in November 2021. This application contains a legitimate program called DeFi Wallet that saves and manages a cryptocurrency wallet, but also implants a full-featured backdoor.
At the end of 2021, we inspected UEFI firmware that was tampered with to embed a malicious code we dub MoonBounce. In this report we describe how the MoonBounce implant works and how it is connected to APT41.
It appears that BlueNoroff shifted focus from hitting banks and SWIFT-connected servers to solely cryptocurrency businesses as the main source of the group’s illegal income.