April 6, 2021 By David Bisson 3 min read

Digital attackers used a strain of crypto malware called ‘AppleJeus’ to steal cryptocurrency.

In a joint advisory published by the FBI and the Department of the Treasury, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) warned that the Hidden Cobra threat group was using AppleJeus to target cryptocurrency exchanges, finance service companies and similar entities.

The malicious actors used trojanized versions of cryptocurrency trading apps to spread the crypto malware. From there, they could prey upon businesses and steal cryptocurrency from specific users’ wallets.

Read on to learn about the many times AppleJeus has appeared over the past few years.

The Seven Known Faces of AppleJeus

CISA used open-source techniques and other means to spot seven instances of Hidden Cobra’s AppleJeus crypto malware.

The first version emerged in August 2018. A version of a cryptocurrency trading app bearing the trojan infected an undisclosed victim’s computer. Bearing the name Celas Trade Pro, AppleJeus infected the victim with FALLCHILL. This remote administration tool let attackers remotely issue commands using a command-and-control server.

Next, CISA found that a phishing email from an LLC company had helped to distribute the trojan in the app.

The second instance of AppleJeus arrived more than a year later, in October 2019. At that time, a company called ‘JMT Trading’ marketed and spread the crypto malware. They claimed it was a cryptocurrency trading app. A download button on the website linked to the company’s GitHub page. There, victims could download the Windows and macOS versions of the crypto malware.

Crypto Malware Hides in Fake Trading Apps

Later that same year, a cybersecurity company formally detected the third iteration of AppleJeus. This time it was hiding inside a cryptocurrency trading app pushed out by a company called ‘Union Crypto’. The researchers did not spot any download links on the company’s website at the time of their work. However, a malware researcher discovered a download link that led to the macOS version. Meanwhile, open-source reporting suggested that the Windows version might have spread on Telegram channels.

The fourth version of the crypto malware arrived in March 2020. As with the cases described above, the malware relied on a fake company for distribution — Kupay Wallet, in this instance. The fake company’s domain used a valid SSL certificate at the time of the research. This might have been an attempt to lull visitors into a false sense of safety. But the certificate was only domain-control validated. That means the domain owners didn’t need to validate their identity or the actual business’s existence.

Two other fake companies called ‘CoinGoTrade’ and ‘Dorusio’ pushed out apps containing AppleJeus crypto malware at around the same time. Both of those entities also used a domain control validated SSL certificate, though the download links for the Dorusio variant resulted in 404 error messages at the time of analysis.

How to Defend Against Crypto Malware Like AppleJeus

In the first few months of 2020, Hidden Cobra used their crypto malware to target business entities and specific users in over 30 countries spread across five continents. These findings highlight the need for groups to defend themselves against crypto malware like AppleJeus. CISA recommended that they begin by investing in security awareness training that uses test attacks to educate their users about social engineering, spearphishing emails and other common digital threats.

CISA also noted that groups should consider using the principle of least privilege to limit the rights user accounts have. They should also patch vectors where threat actors might escalate their privilege in the system.

If you suspect your business has an AppleJeus crypto malware infection, there are some things you can do. CISA advised that you activate your incident response plans, remove any affected hosts from the network and contact the FBI, CISA or Department of the Treasury.

More from News

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

DHS: Guidance for AI in critical infrastructure

4 min read - At the end of 2024, we've reached a moment in artificial intelligence (AI) development where government involvement can help shape the trajectory of this extremely pervasive technology. In the most recent example, the Department of Homeland Security (DHS) has released what it calls a "first-of-its-kind" framework designed to ensure the safe and secure deployment of AI across critical infrastructure sectors. The framework could be the catalyst for what could become a comprehensive set of regulatory measures, as it brings into…

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today