• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

New MacOS Backdoor Communicates Via Public Cloud

You are here: Home / General Cyber Security News / New MacOS Backdoor Communicates Via Public Cloud
July 19, 2022

Security researchers have located a new macOS backdoor being used in focused attacks to steal sensitive facts from victims.

The threat has been named “CloudMensis” by ESET due to the fact it solely takes advantage of public cloud storage products and services to communicate with its operators. Especially, it leverages pCloud, Yandex Disk and Dropbox to acquire commands and exfiltrate files, according to the security seller.

“We continue to do not know how CloudMensis is in the beginning distributed and who the targets are,” defined ESET researcher Marc-Etienne Léveillé, who analyzed the backdoor.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“The normal top quality of the code and absence of obfuscation reveals the authors may not be very common with Mac growth and are not so superior. However, a whole lot of resources had been set into generating CloudMensis a effective spying device and a menace to prospective targets.”

These targets are claimed to be relatively minimal. Once the backdoor gains code execution and administrative privileges, it operates to start with-phase malware which in transform retrieves a additional aspect-rich second stage from a cloud storage support, ESET explained.

This bigger, 2nd ingredient can issue 39 commands including document exfiltration, using screenshots, and lifting email attachments and other delicate information.

Metadata acquired from the 3 impacted cloud storage expert services suggests that instructions started to be issued to target devices on February 4 2022.

Even though the danger actors driving this campaign are exploiting vulnerabilities to circumvent macOS mitigations, ESET did not locate any zero-times all through its research. Procedure directors were as a result urged to make certain any company Macs are managing an up-to-date OS to help mitigate the risk.

Just final week, Apple seemed to accept the trouble of adware focusing on its consumers when it declared a new set of features dubbed “Lockdown Manner.”

Developed to harden the gadgets and devices of at-risk buyers, the options will lower the attack surface area by restricting unique operation these types of as cell gadget management, just-in-time JavaScript compilation and incoming invites and service requests.


Some sections of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News CISA Set to Open London Office
Next Post: Meta begins encrypting Facebook URLs, nullifying tracking countermeasures meta begins encrypting facebook urls, nullifying tracking countermeasures»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.