<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Malware Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/malware/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Fri, 25 Apr 2025 07:51:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Malware Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/malware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>North Korean Hackers Target Crypto Devs!</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Fri, 25 Apr 2025 09:00:24 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI deception]]></category>
		<category><![CDATA[Angeloper]]></category>
		<category><![CDATA[BlockNovas]]></category>
		<category><![CDATA[crypto developers]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[fake companies]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker threat]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[metamask]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[SoftGlide]]></category>
		<category><![CDATA[Web3 threats]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40808</guid>

					<description><![CDATA[<p>A subgroup of Lazarus, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to infect developers with malware. According to Silent Push, these shell companies—BlockNovas, Angeloper Agency, and SoftGlide—are part of a campaign to lure developers through fraudulent job interviews. You Might Be Interested In: Elon Musk</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2705" data-end="3075">A <strong data-start="2707" data-end="2730">subgroup of Lazarus</strong>, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to <strong data-start="2851" data-end="2885">infect developers with malware</strong>. According to <strong data-start="2900" data-end="2915">Silent Push</strong>, these shell companies—<strong data-start="2939" data-end="2953">BlockNovas</strong>, <strong data-start="2955" data-end="2975">Angeloper Agency</strong>, and <strong data-start="2981" data-end="2994">SoftGlide</strong>—are part of a campaign to lure developers through <strong data-start="3045" data-end="3074">fraudulent job interviews</strong>.</p>
<hr />
<p data-start="3077" data-end="3333"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3077" data-end="3333">Two of these companies are even <strong data-start="3109" data-end="3143">legally registered in the U.S.</strong>, adding a layer of legitimacy. During the interview, applicants receive a fake error message while trying to record a video, leading them to copy-paste a fix that actually installs malware.</p>
<h2 data-start="3335" data-end="3390">Malware Targets Wallet Keys and Clipboard Data</h2>
<p class="" data-start="3391" data-end="3692">The campaign utilizes three malware strains: <strong data-start="3436" data-end="3450">BeaverTail</strong>, <strong data-start="3452" data-end="3471">InvisibleFerret</strong>, and <strong data-start="3477" data-end="3493">Otter Cookie</strong>. While <strong data-start="3501" data-end="3515">BeaverTail</strong> is designed for initial compromise and further payload delivery, <strong data-start="3581" data-end="3597">Otter Cookie</strong> and <strong data-start="3602" data-end="3621">InvisibleFerret</strong> focus on extracting <strong data-start="3642" data-end="3664">crypto wallet keys</strong> and <strong data-start="3669" data-end="3691">clipboard contents</strong>.</p>
<p class="" data-start="3694" data-end="4003">Silent Push also discovered that hackers are using <strong data-start="3745" data-end="3768">AI-generated images</strong> and <strong data-start="3773" data-end="3795">stolen real photos</strong> to create fake employee profiles for the companies, boosting credibility. Analyst <strong data-start="3878" data-end="3894">Zach Edwards</strong> noted that some images were subtly altered using AI tools to resemble the original person but appear unique.</p>
<p class="" data-start="4005" data-end="4273">The campaign has been active <strong data-start="4034" data-end="4048">since 2024</strong>, and <strong data-start="4054" data-end="4081">at least two developers</strong> were directly affected—one of whom had their <strong data-start="4127" data-end="4158">MetaMask wallet compromised</strong>. The <strong data-start="4164" data-end="4171">FBI</strong> has since shut down <strong data-start="4192" data-end="4206">BlockNovas</strong>, but <strong data-start="4212" data-end="4225">SoftGlide</strong> and other parts of the operation remain online.</p>
<p data-start="4005" data-end="4273"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-154152 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kuzey-kore.jpg" alt="Kuzey Kore" width="899" height="387" /></p>
<hr />
<p data-start="4005" data-end="4273"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korean Hackers Target Crypto Devs with Fake Job Offers</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 17 Apr 2025 15:00:40 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[API theft]]></category>
		<category><![CDATA[crypto dev hack]]></category>
		<category><![CDATA[developer safety]]></category>
		<category><![CDATA[fake job offers]]></category>
		<category><![CDATA[GitHub attacks]]></category>
		<category><![CDATA[LinkedIn scam]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Slow Pisces]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40403</guid>

					<description><![CDATA[<p>North Korean hacking groups are luring crypto developers with fake job offers and coding tests laced with malware, according to cybersecurity experts. Malware Hidden in &#8220;Coding Assignments&#8221; Hackers from the group Slow Pisces (aka Jade Sleet / TraderTraitor) approach developers on LinkedIn, offering dream gigs in DeFi or blockchain security. Once trust is built, they</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/">North Korean Hackers Target Crypto Devs with Fake Job Offers</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2409" data-end="2571"><strong data-start="2409" data-end="2440">North Korean hacking groups</strong> are luring <strong data-start="2452" data-end="2473">crypto developers</strong> with <strong data-start="2479" data-end="2515">fake job offers and coding tests</strong> laced with malware, according to cybersecurity experts.</p>
<h2 data-start="2573" data-end="2619">Malware Hidden in &#8220;Coding Assignments&#8221;</h2>
<p class="" data-start="2621" data-end="2972">Hackers from the group <strong data-start="2644" data-end="2692">Slow Pisces (aka Jade Sleet / TraderTraitor)</strong> approach developers on LinkedIn, offering dream gigs in <strong data-start="2749" data-end="2757">DeFi</strong> or <strong data-start="2761" data-end="2784">blockchain security</strong>. Once trust is built, they send malware-infected coding challenges hosted on GitHub. When opened, these files steal <strong data-start="2901" data-end="2913">SSH keys</strong>, <strong data-start="2915" data-end="2943">cloud access credentials</strong>, and <strong data-start="2949" data-end="2971">crypto wallet data</strong>.</p>
<hr />
<h4 data-start="1444" data-end="1471"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></h4>
<hr />
<h2 data-start="2974" data-end="3017">Using Freelance Platforms to Spread</h2>
<p class="" data-start="3019" data-end="3159">According to <strong data-start="3032" data-end="3042">Hacken</strong> and <strong data-start="3047" data-end="3057">Cyvers</strong>, platforms like <strong data-start="3074" data-end="3084">Upwork</strong> and <strong data-start="3089" data-end="3099">Fiverr</strong> are also being used by attackers posing as hiring managers.</p>
<p data-start="3019" data-end="3159"><em><span style="font-size: 14.4px;">“They create </span>credible profiles and fake resumes</em><span style="font-size: 14.4px;"><em> just to infiltrate Web3 firms via targeted developers,”</em> says </span>Hayato Shigekawa<span style="font-size: 14.4px;"> of </span>Chainalysis<span style="font-size: 14.4px;">.</span></p>
<h2 data-start="3318" data-end="3348">Security Tips for Devs</h2>
<ul>
<li data-start="3352" data-end="3420">Always use <strong data-start="3363" data-end="3396">virtual machines or sandboxes</strong> to test external code</li>
<li data-start="3423" data-end="3468"><strong data-start="3423" data-end="3444">Verify job offers</strong> via official channels</li>
<li data-start="3471" data-end="3510">Never store secrets in <strong data-start="3494" data-end="3508">plain text</strong></li>
<li data-start="3513" data-end="3579">Be wary of <strong data-start="3524" data-end="3547">unverified packages</strong> and unsolicited opportunities</li>
<li data-start="3582" data-end="3643">Implement <strong data-start="3592" data-end="3615">endpoint protection</strong> and <strong data-start="3620" data-end="3643">operational hygiene</strong></li>
</ul>
<p><em><span style="font-size: 14.4px;">“If it looks </span>too good to be true</em><span style="font-size: 14.4px;"><em>, it probably is,”</em> warns </span><strong style="font-size: 14.4px;" data-start="3708" data-end="3723">Luis Lubeck</strong><span style="font-size: 14.4px;"> of Hacken.</span></p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/">North Korean Hackers Target Crypto Devs with Fake Job Offers</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>New Malware “Cthulhu Stealer” Targets Mac Users and Crypto Wallets</title>
		<link>https://coinengineer.net/blog/new-malware-cthulhu-stealer-targets-mac-users/</link>
					<comments>https://coinengineer.net/blog/new-malware-cthulhu-stealer-targets-mac-users/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Mon, 26 Aug 2024 09:00:51 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[Genel]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[Cthulhu Stealer]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=27642</guid>

					<description><![CDATA[<p>Users of Apple Macs are advised of a fresh kind of malware known as &#8220;Cthulhu Stealer,&#8221; which targets bitcoin wallets and steals personal data. Cybersecurity company Cado Security underlined this risk on August 22, pointing out that while macOS is usually seen as safe, malware assaults on the system have been rising. Cthulhu Stealer passes</p>
<p>The post <a href="https://coinengineer.net/blog/new-malware-cthulhu-stealer-targets-mac-users/">New Malware “Cthulhu Stealer” Targets Mac Users and Crypto Wallets</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Users of<strong> Apple Macs</strong> are advised of a fresh kind of malware known as &#8220;<em>Cthulhu Stealer</em>,&#8221; which targets bitcoin wallets and steals personal data. Cybersecurity company <strong>Cado</strong> <strong>Security</strong> underlined this risk on August 22, pointing out that while macOS is usually seen as safe, malware assaults on the system have been rising.</p>
<p><strong>Cthulhu Stealer</strong> passes for official tools like CleanMyMac and Adobe GenP. Once consumers download the disguised file, the virus asks them to input their system password and then demands the password for prominent crypto wallets like MetaMask, Coinbase, and Binance. Text files contain the pilfers of data; the virus also captures operating system version and IP address of the victim.</p>
<p>&#8220;The main functionality of Ghostbusters Stealer is to steal credentials and bitcoin wallets from many stores, including game accounts,&#8221; said Cado researcher Tara Gould. This virus may be a modified form of Atomic Stealer, another malware found in 2023 aimed against Apple systems, as it shares traits with that other malware.</p>
<p>Reportedly leased out for $500 a month using the Telegram chat system, Cthulhu Stealer was sold and revenues were distributed among associates. But disagreements over payments have resulted in charges of an exit scam by the malware&#8217;s creators.</p>
<p>Apple has responded by noting the increasing danger and updating its macOS system to improve security, especially by bolstering Gatekeeper safeguards to guarantee only trustworthy apps are allowed to operate. Mac users should be alert against any dangers to their computers and bitcoin wallets.</p>
<p><i><span style="font-weight: 400;">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our </span></i><a href="https://t.me/coinengineernews"><i><span style="font-weight: 400;">Telegram, </span></i></a><a href="https://www.youtube.com/@CoinEngineer"><i><span style="font-weight: 400;">YouTube</span></i></a><i><span style="font-weight: 400;">, and </span></i><a href="https://twitter.com/coinengineers"><i><span style="font-weight: 400;">Twitter</span></i></a><i><span style="font-weight: 400;"> channels for the latest </span></i><a href="https://coinengineer.io/news/"><i><span style="font-weight: 400;">news</span></i></a><i><span style="font-weight: 400;"> and updates.</span></i></p>
<p>The post <a href="https://coinengineer.net/blog/new-malware-cthulhu-stealer-targets-mac-users/">New Malware “Cthulhu Stealer” Targets Mac Users and Crypto Wallets</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/new-malware-cthulhu-stealer-targets-mac-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/08/malware.webp' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/08/malware.webp' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korean Hackers Target South Korean Crypto Firms with New &#8220;Durian&#8221; Malware Variant</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-south-korean-crypto-firms-with-new-durian-malware-variant/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-south-korean-crypto-firms-with-new-durian-malware-variant/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Mon, 13 May 2024 13:30:21 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[Durian]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://coinengineer.io/?p=20309</guid>

					<description><![CDATA[<p>Rumours have started of a new cyber threat that is emanating from North Korea as a state-sponsored hacking group called Kimsuky releases a dangerous malware variant that they call “Durian” on the South Korean cryptocurrency companies. This is considered by cybersecurity experts as a major step up in the continuous battle between the two countries</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-south-korean-crypto-firms-with-new-durian-malware-variant/">North Korean Hackers Target South Korean Crypto Firms with New &#8220;Durian&#8221; Malware Variant</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Rumours have started of a new cyber threat that is emanating from North Korea as a state-sponsored hacking group called <strong>Kimsuky</strong> releases a dangerous malware variant that they call <strong>“Durian”</strong> on the <strong>South Korean</strong> cryptocurrency companies. This is considered by cybersecurity experts as a major step up in the continuous battle between the two countries in cyberspace.</p>
<h3>Unveiling the Threat</h3>
<p>In a recent threat report by <strong>Kaspersky</strong>, a major cybersecurity company, it was revealed that Kimsuky deployed the malware Durian for targeted attacks against at least two South Korean crypto companies. Kaspersky called the attack &#8220;persistent,” noting that the exploitation of legitimate security software targeted the crypto industry in South Korea.</p>
<h3>The Anatomy of Durian</h3>
<p>Durian, previously unaccounted for and unnamed by security researchers, acts as a multifaceted installer, allowing for the constant deployment of malicious tools. Some of these tools include the infamous “<strong>AppleSeed”</strong> backdoor, a custom proxy tool called LazyLoad, and even seemingly innocuous software such as Chrome Remote Desktop. Kaspersky explained the capacities of Durian, highlighting the complete backdoor capability for command execution, file downloading, and data exfiltration.</p>
<h3>Lazarus Linkage</h3>
<p>Particularly, Kaspersky linked the Durian campaign with the notorious North-Korean hacking team, the <a href="https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/">Lazarus Group.</a> Andariel, a Lazarus subgroup, had also used LazyLoad, a component of Durian. This connection implies that there is cooperation or common resources between Kimsuky and the notorious Lazarus Group.</p>
<h3>The Lazarus Ledger</h3>
<p>The association of the Lazarus Group with crypto heists dates back to the year of its emergence, which is 2009. Lately, blockchain investigator ZachXBT uncovered the widespread money laundering operations of Lazarus, <strong>uncovering a mind-blowing $200 million laundered between 2020 and 2023.</strong> Accusations against Lazarus total over <strong>$3 billion</strong> in crypto theft over six years, with a chunk of 17%, or approximately $309 million, from their 2023 activities.</p>
<p>The evolution of the cyber battlefield gave rise to Durian and reflected the North Korean threat actors’ quest for monetary profits. While the shadow of Lazarus is still present in the crypto world, the affirmative force of South Korean organizations and the watchfulness of cybersecurity specialists are crucial in stopping such intricate attacks.</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-south-korean-crypto-firms-with-new-durian-malware-variant/">North Korean Hackers Target South Korean Crypto Firms with New &#8220;Durian&#8221; Malware Variant</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-south-korean-crypto-firms-with-new-durian-malware-variant/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/05/hacker.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/05/hacker.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
