{"id":69643,"date":"2024-01-24T03:36:27","date_gmt":"2024-01-24T07:36:27","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=69643"},"modified":"2024-01-24T03:42:28","modified_gmt":"2024-01-24T07:42:28","slug":"macbook-users-in-crypto-space-targeted-by-malware-attack","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/macbook-users-in-crypto-space-targeted-by-malware-attack\/","title":{"rendered":"Macbook Users in Crypto Space Targeted by Malware Attack"},"content":{"rendered":"\n<p>A new malware attack discovered by Kaspersky targets <a href=\"https:\/\/coinscreed.com\/staging\/metamask-warns-apple-users-of-phishing-attack.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Macbook users<\/a> in the crypto space by repacking pre-cracked applications with a Trojan proxy and a post-installation script. The malware executes arbitrary commands and steals sensitive information from the infected system.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware-1024x576.webp\" alt=\"Macbook Users in Crypto Space Targeted by Malware Attack\" class=\"wp-image-69645\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware-1024x576.webp 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware-300x169.webp 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware-768x432.webp 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware-1536x864.webp 1536w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware-1320x743.webp 1320w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware-750x422.webp 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware-1140x641.webp 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware.webp 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Researchers from <a href=\"https:\/\/www.kaspersky.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Kaspersky <span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a>found a new malware attack for Macbook users who work with cryptocurrency. The malware is hidden in pirated software that hackers give away for free. People who want apps for free download them without realizing there is malware inside.<\/p>\n\n\n\n<p>Once users attempt to install the cracked applications, they unknowingly trigger the infection process. The infected installation package displays a window with installation instructions, asking them to copy the application to the <strong>\/Applications\/ directory <\/strong>and launch an application called <strong>\u201cActivator.\u201d<\/strong><\/p>\n\n\n\n<p>Activator, however, is not a genuine application but a malware component that prompts users to enter a password, effectively granting the malware administrator privileges. Upon execution, the malware checks the system for an installed copy of <a href=\"https:\/\/www.python.org\/downloads\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Python 3<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> and, if absent, installs a previously copied version of Python 3 from the Macbook operating system directory.<\/p>\n\n\n\n<p>The malware then <strong>\u201cpatches\u201d<\/strong> the downloaded app by comparing the modified executable with a sequence hardcoded inside Activator. If a match is found, the malware removes the initial bytes, making the application appear cracked and functional to the user. <\/p>\n\n\n\n<p>However, this is only a deception, as the malware initiates its main payload.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What the Malware Does<\/h3>\n\n\n\n<p>The infected sample establishes communication with a command-and-control (C2) server by generating a unique web address through a combination of hardcoded words and a random third-level domain name. <\/p>\n\n\n\n<p>This method lets the malware conceal its activities within normal DNS server traffic, ensuring the payload download.<\/p>\n\n\n\n<p>The decrypted script obtained from the C2 server reveals that the malware operates by executing arbitrary commands received from the server. These commands are often delivered as Base64-encoded Python scripts.<\/p>\n\n\n\n<p>Furthermore, <a href=\"https:\/\/securelist.com\/new-macos-backdoor-crypto-stealer\/111778\/?reseller=sea_regular-sm_acq_ona_smm__onl_b2b_twi_lnk_sm-team______\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the malware harvests sensitive information<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> from the infected system, including the operating system version, user directories, list of installed applications, CPU type, and external IP address. The gathered data is then sent back to the server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-to-protect-your-macbook-from-the-malware-attack\">How to Protect Your Macbook from the Malware Attack<\/h3>\n\n\n\n<p>According to Kaspersky, the malware attack is still active and poses a serious threat to Macbook users in the crypto space. The cybersecurity firm advises users to avoid downloading applications from untrusted sources, especially those that claim to be pre-cracked or offer paid features for free.<\/p>\n\n\n\n<p>Users could also install a reliable antivirus software and keep it updated, as well as scan their system regularly for any signs of infection. <\/p>\n\n\n\n<p>Macbook users should also be wary of suspicious password or permission requests and report any anomalies to their antivirus vendor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new malware attack discovered by Kaspersky targets Macbook users in the crypto space by repacking pre-cracked applications with a Trojan proxy and a post-installation script. The malware executes arbitrary commands and steals sensitive information from the infected system. Researchers from Kaspersky found a new malware attack for Macbook users who work with cryptocurrency. The [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":69645,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21,11476],"tags":[16269,18018,18017],"class_list":["post-69643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-hacks-and-scams","tag-crypto-malware","tag-kapersky","tag-macbook"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/01\/macbook-malware.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/69643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=69643"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/69643\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/69645"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=69643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=69643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=69643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}