Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Incident: Life Saving Victoria server hacked by ‘malicious actors’ | ABC News Australia

    April 8, 2026

    Incident: Yakult Australia targeted in cyber attack, employee files published on dark web | ABC News Australia

    April 8, 2026

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering
    News

    UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering

    adminBy adminMarch 26, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    DEEPBREATH

    A new piece of macOS malware identified during the intrusion was DEEPBREATH, a sophisticated data miner designed to bypass a key component of macOS privacy: the Transparency, Consent, and Control (TCC) database. 

    Written in Swift, DEEPBREATH’s primary purpose is to gain access to files and sensitive personal information.

    TCC Bypass

    Instead of prompting the user for elevated permissions, DEEPBREATH directly manipulates the user’s TCC database (TCC.db). It executes a series of steps to circumvent protections that prevent direct modification of the live database:

    1. Staging: It leverages the Finder application to rename the user’s TCC folder and copies the TCC.db file to a temporary staging location, which allows it to modify the database unchallenged. 

    2. Permission Injection: Once staged, the malware programmatically inserts permissions, effectively granting itself broad access to critical user folders like Desktop, Documents, and Downloads.

    3. Restoration: Finally, it restores the modified database back to its original location, giving DEEPBREATH the broad file system access it needs to operate.

    It should be noted that this technique is possible due to the Finder application possessing Full Disk Access (FDA) permissions, which are the permissions necessary to modify the user-specific TCC database in macOS. 

    To ensure its operation remains uninterrupted, the malware uses an AppleScript to re-launch itself in the background using the -autodata argument, detaching from the initial process to continue data collection silently throughout the user’s session.

    With elevated access, DEEPBREATH systematically targets high-value data:

    • Credentials: Steals login credentials from the user keychain (login.keychain-db)

    • Browser Data: Copies cookies, login data, and local extension settings from major browsers including Google Chrome, Brave, and Microsoft Edge across all user profiles

    • Messaging and Notes: Exfiltrates user data from two different versions of Telegram and also targets and copies database files from Apple Notes

    DEEPBREATH is a prime example of an attack vector focused on bypassing core operating system security features to conduct widespread data theft.

    SUGARLOADER

    SUGARLOADER is a downloader written in C++ historically associated with UNC1069 intrusions.

    Based on the observations from this intrusion, SUGARLOADER was solely used to deploy CHROMEPUSH. If SUGARLOADER is run without any command arguments, the binary checks for an existing configuration file located on the victim’s computer at /Library/OSRecovery/com.apple.os.config. 

    The configuration is encrypted using RC4, with a hard-coded 32-byte key found in the binary. 

    Once decrypted, the configuration data contains up to two URLs that point to the next stage. The URLs are queried to download the next stage of the infection; if the first URL responds with a suitable executable payload, then the second URL is not queried. 

    The decrypted SUGARLOADER configuration for the sample analysed by Mandiant included the following C&C servers:

    • breakdream[.]com:443
    • dreamdie[.]com:443

    CHROMEPUSH

    During this intrusion, a second dataminer was recovered and named CHROMEPUSH. This data miner is written in C++ and installs itself as a browser extension targeting Chromium-based browsers, such as Google Chrome and Brave, to collect keystrokes, username and password inputs, and browser cookies, which it uploads to a web server.

    CHROMEPUSH establishes persistence by installing itself as a native messaging host for Chromium-based browsers. For Google Chrome, CHROMEPUSH copies itself to %HOME%/Library/Application Support/Google/Chrome/NativeMessagingHosts/Google Chrome Docs and creates a corresponding manifest file, com.google.docs.offline.json, in the same directory.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSpring security advisory (AV26-288) – Canadian Centre for Cyber Security
    Next Article Enemy at the FortiGates: Fortinet Devices Remain Vulnerable
    admin
    • Website

    Related Posts

    News

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026
    News

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Incident: Life Saving Victoria server hacked by ‘malicious actors’ | ABC News Australia

    April 8, 2026

    Incident: Yakult Australia targeted in cyber attack, employee files published on dark web | ABC News Australia

    April 8, 2026

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.