It exposes your device to potential security threats, such as viruses and spyware. So here are 5 things you can do to protect yourself.ġ) Don’t download bootleg software: It’s not worth the risk to download bootleg software. Because of this, hackers have to find ways to trick you into downloading the malware in the first place. In the case of this threat, hackers understand that cryptocurrency users are probably more tech-savvy than the average person, and are therefore more attuned to hacks that are out there. This is done by clicking on a link or a file that’s generally suspicious, but not always. Remember, for the hacker to get the malware on your device, you have to download it. Hackers have used this method of exploiting pirated software before, and they’ll do it again. Of course, if you also don’t have cryptocurrency, you’re probably okay, too. However, this unique type of malware that uses pirated software to get on your device is not all that new. We don’t know for sure, but this seems to suggest that if you’re not running that, then you might be safe from this hack, this time. MORE: BEWARE OF FAKE BROWSER UPDATES ON YOUR MACĪnother note that Kaspersky mentioned for this particular malware has been targeting users with the macOS Ventura 13.6, which was just released in September 2023. This is when the hacker executes their dirty work: searching for cryptocurrency wallets, replacing them, and looting your dough. When this happens successfully, (or, rather - unsuccessfully to you), the hacker can spy on your device and receive commands from their server. When you download one of these apps, it launches “Activator”, which prompts you to put in your device’s username and password to install and launch the software, when you think you’re installing an app. The deceptive ‘Activator’ app and its cryptocurrency heist MORE: STEALTHY BACKDOOR MAC MALWARE THAT CAN WIPE OUT YOUR FILES The lesson is to avoid downloading pirated software from unauthorized sources to protect yourself from such malware infections. These are identified as being loaded with this Trojan-Proxy malware: These applications are often distributed illegally and without the consent of the software creator. The pirated applications are versions of software that have been modified to remove or disable features that are only available in paid versions, such as license verification. What 37 pirated applications are being loaded with this malware? PKG installers, which contain scripts that execute after installation, altering system files and setting up the malware to run as a system process. This malware can be used by attackers to gain money or perform criminal activities using your device. Then, in February, security firm Jamf found another cryptocurrency-focused macOS malware circulating through a pirated version of Apple’s Final Cut Pro software. With this, the malware’s creator took pre-compromised versions of the pirated software - one example being xScope, a paid macOS utility - and altered a few bytes of code to get the job done. A cracked software has broken protection, thus making it easier for hackers to infiltrate it with code. Kaspersky reported that this new malware is coming through cracked software applications online. How does this malware get on your device? MORE: HOW CROOKS ARE USING SKIMMERS AND SHIMMERS TO STEAL YOUR MONEY AT YOUR ATM MACHINE
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |