North Korean threat actors have launched a novel approach to target macOS devices, using trojanized Notepad apps and Minesweeper games developed with Flutter and signed using a valid Apple developer ID. This marks the first time these adversaries have employed this method to compromise macOS systems. The distribution method for these malicious apps remains unknown, as does any evidence of specific targeting, suggesting the attackers may be testing a new delivery vector.
Get through updates and upcoming events, and more directly in your inbox