Back to blog
Cybersecurity
Publication date:04.29.2025
Author:M Hinrichs

Tsunami Malware: A New Threat Combining Credential Theft and Cryptomining

Tsunami malware, linked to North Korean hackers, poses a significant threat by combining credential theft and cryptomining capabilities. Learn about its infection process and features.

Digital wave over a computer representing cyber threats.

A sophisticated malware framework known as "Tsunami" has emerged as a significant threat, actively targeting users through a complex infection chain. This malware not only steals credentials but also incorporates cryptomining capabilities, posing a serious risk to individuals and organizations alike.

Key Takeaways

  • Tsunami malware is linked to North Korean threat actors, specifically the Lazarus Group.
  • The malware employs a multi-stage infection process, starting with a malicious payload.
  • It targets various web browsers and cryptocurrency wallets for credential theft.
  • The malware's development is ongoing, with new features being added regularly.

Overview of Tsunami Malware

Tsunami malware has been identified as part of the ongoing "Contagious Interview" campaign, which primarily focuses on cryptocurrency theft within software development environments. The campaign was first observed in the fall of 2024 and has since evolved into a more sophisticated threat.

Infection Process

The attack begins with the chainloading of a malicious BeaverTail payload, which is delivered through a compromised private GitHub repository. Here’s how the infection unfolds:

  1. Initial Access: Victims are lured into executing the malware through social engineering tactics on platforms like LinkedIn, where attackers pose as potential business partners.
  2. Deployment of Intermediate Malware: Once the initial payload is executed, it deploys the InvisibleFerret malware as an intermediate step.
  3. Credential Theft and Cryptomining: The Tsunami framework then activates its extensive arsenal of credential stealers and cryptominers.

Features of Tsunami Malware

The Tsunami malware framework is modular, consisting of over 25 different components. Key features include:

  • Browser Credential Stealers: Targets popular browsers such as Chrome, Firefox, Brave, Edge, and OperaGX.
  • Cryptocurrency Wallet Compromise: Specifically focuses on Exodus and Ethereum wallets.
  • Cryptominers: Deploys two separate miners for Monero and Ethereum to monetize compromised systems.

Persistence Mechanisms

Tsunami employs advanced techniques to maintain access to infected systems:

  • Windows Startup Folder: A Python-based launcher creates a file named "Windows Update Script.pyw" in the startup folder.
  • Scheduled Tasks: It sets up scheduled tasks that trigger at user logon, ensuring the malware runs continuously.
  • Defense Evasion: The malware adds multiple exclusions to Windows Defender and modifies Windows Firewall rules to avoid detection.

Command and Control Infrastructure

The command and control (C2) operations of Tsunami utilize the TOR network and Pastebin, enhancing the operational security of the threat actors. The C2 infrastructure includes an onion domain, making it difficult for defenders to analyze and block malicious traffic.

Conclusion

The emergence of Tsunami malware highlights the evolving landscape of cyber threats, particularly those associated with cryptocurrency theft. As the malware continues to develop, it poses a growing risk to users and organizations, emphasizing the need for robust cybersecurity measures to combat such sophisticated attacks.

Buy D223 Tokens with Bitmart

 

 - - -

This article was written with the assistance of AI to gather information from multiple reputable sources. The content has been reviewed and edited by our editorial team to ensure accuracy and coherence. The views expressed are those of the author and do not necessarily reflect the views of Dex223. This article is for informational purposes only and does not constitute financial advice. Investing involves risk, and you should consult a qualified financial advisor before making any investment decisions.