Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » MacOS malware hides in cracked apps, targets crypto wallets
    Cyber Security

    MacOS malware hides in cracked apps, targets crypto wallets

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 23, 2024Editorial DepartmentMalware/Cryptocurrency

    crypto wallet

    The cracked software was observed infecting Apple macOS users with a previously undocumented stealer malware capable of collecting system information and cryptocurrency wallet data.

    Kaspersky discovered the artifacts in the wild and said they were designed to target machines running macOS Ventura 13.6 and later, suggesting the malware is capable of infecting Macs powered by Intel and Apple silicon processor architectures.

    The attack chain utilizes booby-trapped disk image (DMG) files, which include a program called “Activator” and pirated versions of legitimate software such as xScope.

    It is recommended that the user who ultimately opens the DMG file moves both files to the Applications folder and executes the Activator element to apply the supposed patch and execute the xScope application.

    Internet security

    However, launching the Activator displays a prompt asking the victim to enter the system administrator password, allowing the victim to execute the Mach-O binary with elevated privileges to launch the modified xScope executable.

    Security researcher Sergey Puzan said: “The trick is that the malicious actor takes a pre-cracked version of the application and adds a few bytes to the beginning of the executable file, thereby disabling it and Causes the user to launch the Activator.”

    The next stage requires establishing contact with the command and control (C2) server to obtain the encrypted script. The C2 URL is constructed by combining words from two hard-coded lists and adding a random sequence of five letters as the third-level domain name.

    crypto wallet

    A DNS request for the domain is then sent to retrieve three DNS TXT records, each containing a Base64-encoded ciphertext fragment, which is decrypted and assembled to construct a Python script, which in turn reaches out via to establish persistence and act as a downloader to Apple Health[.]org” downloads and executes the main load every 30 seconds.

    “It’s a pretty interesting and unusual way to contact a command and control server and hide the activity in the traffic, and it guarantees that the payload is downloaded because the response message comes from the DNS server,” Puzan explained, adding It’s described cleverly as “serious”. “

    The backdoor is actively maintained and updated by threat actors and is designed to run incoming commands, collect system metadata, and check for the presence of Exodus and Bitcoin Core wallets on the compromised host.

    Internet security

    If found, the application will be replaced by a Trojan version downloaded from the “apple-analyst” domain[.]com”, which can leak seed phrases, wallet unlock passwords, names and balances to attacker-controlled servers.

    “The final payload is a backdoor that can run any script with administrator rights and replace the Bitcoin Core and Exodus crypto wallet applications installed on the computer with infected versions that steal the secret recovery phrase when the wallet is unlocked,” “Puzan said.

    This development comes as cracked software is increasingly becoming a conduit for harming macOS users with a variety of malware, including Trojan-Proxy and ZuRu.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.