• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
mac users beware: new trojan proxy malware spreading via pirated software

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software

You are here: Home / General Cyber Security News / Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software
December 8, 2023

Unauthorized internet websites distributing trojanized variations of cracked computer software have been observed to infect Apple macOS end users with a new Trojan-Proxy malware.

“Attackers can use this kind of malware to acquire revenue by developing a proxy server network or to accomplish prison acts on behalf of the sufferer: to launch attacks on web-sites, businesses and men and women, purchase guns, medicines, and other illicit merchandise,” Kaspersky security researcher Sergey Puzan said.

The Russian cybersecurity agency mentioned it discovered evidence indicating that the malware is a cross-platform menace, owing to artifacts unearthed for Windows and Android that piggybacked on pirated equipment.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The macOS variants propagate underneath the guise of reputable multimedia, picture editing, information recovery, and productiveness equipment. This implies that users hunting for pirated computer software are the targets of the marketing campaign.

Approaching WEBINAR Cracking the Code: Learn How Cyber Attackers Exploit Human Psychology

Ever questioned why social engineering is so helpful? Dive deep into the psychology of cyber attackers in our impending webinar.

Be a part of Now

Contrary to their legitimate, unaltered counterparts, which are offered as disk impression (.DMG) data files, the rogue versions are shipped in the variety of .PKG installers, which arrive equipped with a put up-install script that activates the malicious habits write-up installation.

“As an installer typically requests administrator permissions to functionality, the script run by the installer approach inherits all those,” Puzan noted.

The conclude aim of the marketing campaign is to launch the Trojan-Proxy, which masks itself as the WindowServer procedure on macOS to evade detection. WindowServer is a main process procedure liable for window management and rendering the graphical person interface (GUI) of purposes.

On commence, it makes an attempt to receive the IP address of the command-and-manage (C2) server to hook up to via DNS-over-HTTPS (DoH) by encrypting the DNS requests and responses employing the HTTPS protocol.

Cybersecurity

Trojan-Proxy subsequently establishes get in touch with with the C2 server and awaits even more instructions, which includes processing incoming messages to parse the IP handle to connect to, the protocol to use, and the concept to mail, signaling that its ability to act as a proxy through TCP or UDP to redirect traffic via the contaminated host.

Kaspersky explained it identified samples of the malware uploaded to the VirusTotal scanning motor as early as April 28, 2023. To mitigate these threats, end users are recommended to steer clear of downloading program from untrusted resources.

Observed this report exciting? Follow us on Twitter  and LinkedIn to examine far more special content material we article.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «wordpress releases update 6.4.2 to address critical remote attack vulnerability WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
Next Post: Ransomware-as-a-Service: The Growing Threat You Can’t Ignore ransomware as a service: the growing threat you can't ignore»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.