Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Hackers target macOS users by spreading malvertising that steals malware
    Cyber Security

    Hackers target macOS users by spreading malvertising that steals malware

    techempireBy techempire4 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 30, 2024Editorial DepartmentMalware/Cryptocurrency

    macOS malware

    Malvertising and fake websites served as conduits for the spread of two different types of stealing malware, including Atomic Stealer, which targeted Apple macOS users.

    Persistent information stealer attacks targeting macOS users may employ different methods to compromise victims’ Macs, but the ultimate goal is to steal sensitive data, Jamf Threat Lab said in a report released on Friday.

    The target of this type of attack chain is users searching for Arc Browser on search engines such as Google to provide false advertisements and redirect users to similar websites (“airci[.]net”) to serve malware.

    “Interestingly, the malicious website cannot be accessed directly as it returns an error,” said security researchers Jaron Bradley, Ferdous Saljooki and Maggie Zirnhelt. “It is only accessible through a generated sponsored link, presumably to evade detection.”

    Disk image files downloaded from a fake website (“ArcSetup.dmg”) provide Atomic Stealer, which uses false prompts to ask users to enter their system password, ultimately facilitating information theft.

    Internet security

    Jamf said it also discovered a fake website called meethub[.]gg claims to offer free group meeting scheduling software, but actually installs another type of stealing malware that can collect users’ keychain data, credentials stored in web browsers, and information from cryptocurrency wallets .

    Much like the Atomic stealer, this malware (which is said to overlap with the Rust-based stealer family called Realst) also uses AppleScript calls to prompt users for their macOS login password in order to perform its malicious actions.

    Attacks allegedly exploited the malware to discuss job opportunities and interview them podcastthen ask them to download the app from meethub[.]gg Join the video meeting provided in the meeting invitation.

    “These attacks are often focused on the cryptocurrency industry, as such attacks can result in large losses to the attackers,” the researchers said. “Industry insiders should be highly aware that it is often easy to find public information that they are asset holders. , or be easily associated with companies that place them in the industry.”

    Moonlock Lab, the cybersecurity arm of MacPaw, revealed that a malicious DMG file (“App_v1.0.4.dmg”) is being used by threat actors to deploy stealth malware designed to extract credentials and data from various applications.

    This is accomplished via obfuscated AppleScript and bash payloads retrieved from Russian IP addresses, with the former used to launch deceptive prompts (as described above) to trick users into providing their system passwords.

    Internet security

    “It disguises itself as a harmless DMG file and uses a phishing image to trick users into installing it, thereby convincing users to bypass macOS’s Gatekeeper security feature,” said security researcher Mykhailo Hrebeniuk.

    This development demonstrates that macOS environments are increasingly at risk from stealer attacks, with some strains even possessing sophisticated anti-virtualization techniques by activating a self-destructing kill switch to evade detection.

    In recent weeks, malvertising campaigns have also been observed using Go-based loaders to push the FakeBat loader (also known as EugenLoader) and other information-stealing programs (such as Rhadamanthys) through decoy websites for popular software such as Notion and PuTTY.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.