Hackers continue to relentlessly target meeting apps, exploiting their widespread usage and access to sensitive data. Among these platforms, Miro Talk, a popular meeting app, has been identified as a weaponized tool used by North Korean hackers to target macOS users.
Cybersecurity analyst Patrick Wardle from Objective-See has uncovered how hackers use meeting apps like Miro Talk to infiltrate systems and steal valuable information. The high level of trust placed in these communication tools makes them ideal targets for malicious actors looking to spread malware or compromise organizations.
The malwarehunterteam brought attention to this new Mac malware, known as MiroTalk.dmg, which was undetected by traditional antivirus engines like VirusTotal. This malicious disk image was part of a phishing campaign with ties to North Korean hackers, who often masquerade as job seekers to lure victims.
By analyzing the MiroTalk.dmg file, cybersecurity researchers identified a 64-bit Intel Mach-O executable named Jami, designed to exfiltrate sensitive data and communicate with a command-and-control server. The malware’s capabilities include targeting browser data, cryptocurrency wallets, and the macOS keychain.
Moreover, the malware appears to be cross-platform, written in Python, and contains malicious scripts to steal information. Its connection to previous DPRK campaigns, as documented by Palo Alto Network’s Unit42, indicates a strategic shift in North Korean cyber operations towards more sophisticated attacks.
Despite initial attempts at exfiltration failing, the malware’s similarities to known DPRK threats like BeaverTail suggest a coordinated effort to enhance their capabilities. The use of native QT variations instead of JavaScript-based threats signifies a shift towards more advanced cyber tools.
The C2 server associated with the malware also hosts other malicious payloads, including a Python downloader and a cross-platform backdoor. These findings underscore the evolving nature of cyber threats posed by North Korean hackers and highlight the need for organizations to remain vigilant against such attacks.
As cybersecurity experts continue to monitor and analyze these malicious activities, it is crucial for users and businesses to enhance their security measures and stay informed about the latest threats. By understanding the tactics employed by hackers and leveraging advanced security tools, organizations can better protect themselves against cyber threats.
The discovery of weaponized meeting apps like Miro Talk serves as a stark reminder of the ever-present dangers in the digital landscape. As hackers evolve and refine their techniques, it is imperative for individuals and organizations to prioritize cybersecurity and take proactive steps to safeguard their sensitive information.

