Tag: MACOS
Threat Actor: _lain | _lain Victim: Developers using npm packages | developers using npm packages
Key Point :
Malicious npm packages impersonating legitimate tools have been found, with one package attracting over 1,000 downloads.…Keypoints :
Lazarus is known for its advanced persistent threat (APT) tactics.…Threat Actor: Unknown | unknown Victim: iTerm2 Users | iTerm2 users
Key Point :
A vulnerability in iTerm2 versions 3.5.6 to 3.5.10 could expose sensitive data due to improper logging.…Threat Actor: Unprivileged attackers | unprivileged attackers Victim: macOS users | macOS users
Key Point :
SysBumps exploits speculative execution vulnerabilities in macOS system calls.…Keypoints :
Multiple critical vulnerabilities identified across various software products.…Keypoints :
Threat actors are weaponizing OAST techniques to exfiltrate sensitive data.…Threat Actor: Unknown | FireScam Victim: Android Users | Android Users
Key Point :
FireScam is distributed via a phishing website that mimics the RuStore application store.…### #CitrineSleet #InletDrift #DeFiHeist
Summary: Radiant Capital has attributed a $50 million cryptocurrency theft to North Korean threat actors known as Citrine Sleet, following a sophisticated cyberattack that exploited vulnerabilities in their systems. The attack involved malware that bypassed multiple security layers, leading to unauthorized transactions.…
### #Web3Security #MeetenMalware #CryptoTheft
Summary: Cybercriminals are exploiting the Web3 sector by using fake business meetings to distribute malware that targets cryptocurrency assets. Dubbed “Meeten,” this campaign employs sophisticated social engineering tactics to lure victims into downloading malicious software.
Threat Actor: Cybercriminals | Meeten Victim: Individuals in Web3 | Web3 professionals
Key Point :
The “Meeten” campaign uses fraudulent video conferencing software to distribute Realst stealer malware targeting both Windows and macOS systems.…### #BansheeStealer #MalwareLeak #MacOSThreats
Summary: The source code for the macOS malware Banshee Stealer has been leaked and published on GitHub, leading to the shutdown of its operations by its developers. This malware, which targeted sensitive data, was previously promoted by Russian hackers.
Threat Actor: Russian hackers | Russian hackers Victim: Banshee Stealer users | Banshee Stealer users
Key Point :
Source code for Banshee Stealer was leaked and published by VXunderground on GitHub.…Keypoints :
CryptoLove has been operating for over two years, specializing in crypto scams.…### #MacOSMalware #BANSHEEStealer #MaaSThreats
Summary: In August 2024, Russian hackers released BANSHEE Stealer, a macOS malware designed to steal sensitive data from browsers and cryptocurrency wallets. The malware’s source code was later leaked, leading to the shutdown of its operations.
Threat Actor: Russian Hackers | Russian Hackers Victim: macOS Users | macOS Users
Key Point :
BANSHEE Stealer targets both x86_64 and ARM64 architectures, capable of stealing data from nine different browsers.…### #AppleSecurity #ThreatAnalysis #ZeroDayVulnerabilities
Summary: Apple has released critical security updates addressing two actively exploited vulnerabilities in its operating systems, discovered by Google’s Threat Analysis Group. The vulnerabilities, CVE-2024-44308 and CVE-2024-44309, primarily affect Intel-based Mac systems and could allow for arbitrary code execution.
Threat Actor: Government-backed hackers | government-backed hackers Victim: Apple Inc.…
### #CyberSecurity #Malware #AIThreats Summary: Fake AI image and video generators are being used to distribute Lumma Stealer and AMOS malware, targeting Windows and macOS systems to steal sensitive information such as credentials and cryptocurrency wallets. These malicious sites impersonate a legitimate AI application, tricking users into downloading harmful software.…
Summary: Researchers at Group-IB have uncovered a new stealth technique used by the North Korean APT group Lazarus, which targets macOS systems through a code-smuggling method that utilizes custom extended attributes to evade antivirus detection. This method involves the deployment of a Trojan named RustyAttr, developed with the Tauri framework, allowing the malware to operate discreetly while distracting users with decoy applications.…
Summary: Zoom has addressed six vulnerabilities in its video conferencing platform, including two high-severity issues that could allow remote attackers to escalate privileges or leak sensitive information. The vulnerabilities affect various Zoom applications and require updates to mitigate risks.
Threat Actor: Remote attackers | remote attackers Victim: Zoom | Zoom
Key Point :
Two high-severity vulnerabilities (CVE-2024-45421 and CVE-2024-45419) allow privilege escalation and information disclosure.…