Macbook Crypto Users Targeted By Advanced Malware Attack, Cybersecurity Firm Warns

Share This Post

In the rapidly growing crypto industry, the widespread adoption of cryptocurrencies has attracted not only legitimate users but also cybercriminals seeking to exploit vulnerabilities

Recent findings from cybersecurity firm Kaspersky shed light on a sophisticated malware attack targeting Macbook users in the crypto space. 

Harvesting Sensitive Data From Infected Mac Systems

Kaspersky Lab experts discovered that the attackers repacked pre-cracked applications as Package (PKG) files – a type of file format commonly used on Macbooks – and embedded a Trojan proxy and a post-installation script. 

The malware-laden applications were mainly distributed through pirated software channels. Once users attempted to install the cracked applications, they unknowingly triggered the infection process.

To deceive users, the infected installation package displayed a window with installation instructions, instructing them to copy the application to the /Applications/ directory and launch an application called “Activator.” 

Crypto

Although appearing unsophisticated at first glance, Activator prompted users to enter a password, effectively granting the malware administrator privileges.

Upon execution, the malware checked the system for an installed copy of the programming language Python 3 and, if absent, installed a previously copied version of Python 3 from the Macbook operating system directory. 

The malware then ” patched” the downloaded app by comparing the modified executable with a sequence hardcoded inside Activator. If a match was found, the malware removed the initial bytes, making the application appear cracked and functional to the user. However, the true intentions of the attackers became apparent as the malware initiated its main payload. 

The infected sample established communication with a command-and-control (C2) server by generating a unique Uniform Resource Locator (URL), or web address, through a combination of hardcoded words and a random third-level domain name. 

This method allowed the malware to conceal its activities within normal DNS server traffic, ensuring the payload download.

The decrypted script obtained from the C2 server – a remote server or infrastructure used by cybercriminals to control and manage their malware or botnet operations – revealed that the malware operated by executing arbitrary commands received from the server. These commands were often delivered as Base64-encoded Python scripts.

Furthermore, the malware harvested sensitive information from the infected system, including the operating system version, user directories, list of installed applications, CPU type, and external IP address. The gathered data was then sent back to the server.

Malware Campaign Targets Crypto Wallet Applications

While analyzing the malware campaign, Kaspersky observed that the C2 server did not return any commands during their investigation and eventually stopped responding. 

However, subsequent attempts to download the third-stage Python script led to the discovery of updates in the script’s metadata, indicating ongoing development and adaptation by the malware operators.

Additionally, the malware contained functions specifically targeting popular crypto wallet applications, such as Exodus and Bitcoin-Qt. 

If these applications were detected on the infected system, the malware attempted to replace them with infected versions obtained from a different host, apple-analyzer [.]com. 

These infected crypto wallets included mechanisms to steal wallet unlock passwords and secret recovery phrases from unsuspecting users.

The cybersecurity firm emphasized that malicious actors continue to distribute cracked applications to gain access to users’ computers. 

By exploiting user trust during software installation, attackers can easily escalate their privileges by prompting users to enter their passwords. Kaspersky also highlighted the techniques employed by the malware campaign, such as storing the Python script inside a domain TXT record on a DNS server, demonstrating the “ingenuity” of the attackers.

Crypto

Featured image from Shutterstock, chart from TradingView.com

Read Entire Article
spot_img

Related Posts

Floki Inu Frenzy: Memecoin Eyes New Highs As Open Interest Soars

Floki Inu (FLOKI), the Shiba Inu-inspired memecoin, has rocketed into the spotlight with a surge in trading activity and a nearly 20% price increase in the past week However, experts caution that

Value Locked in Defi Nears $100B Range Again After $11.89B Increase in 35 Days

Over the past 35 days, the total value locked in decentralized finance (defi) protocols has expanded by $1189 billion, recovering from a low of just over $83 billion on April 13 Although it has not

14 Years Ago, an Individual Offered 10,000 Bitcoins for 2 Pizzas, Finalizing the Deal in 4 Days

Approximately 14 years ago today, Laszlo Hanyecz posted on bitcointalkorg, offering 10,000 bitcoins for “a couple of pizzas” However, most people are not aware that it took him four

Cardano Whales Return To The Table, Increase Massive Holdings By 10%

Cardano (ADA) whales are back in the picture, with recent data suggesting their confidence in the crypto token may have been revived If so, this will be massive for ADA, which could experience

Crypto Power: Michael Saylor Says Wall Street And Congress ‘Want Bitcoin’

The crypto industry is popping champagne corks (or perhaps uncorking their digital wallets) after a surprise victory in the US Senate On Thursday, the upper chamber voted 60-38 to repeal a

Using Power Laws to predict when the Bitcoin price will hit $1 million

The following is a guest post by Rajagopal Menon, the Vice President of WazirX Come the bull market, cometh the models to predict the price of Bitcoin In the last bull market in 2021, the
- Advertisement -spot_img