New Variant Of UpdateAgent Malware Infects Mac Computers With Adware
Microsoft on Wednesday shed light on a previously undocumented Mac trojan that it said has undergone several iterations since its first appearance in September 2020, effectively granting it an "increasing progression of sophisticated capabilities."
The company's Microsoft 365 Defender Threat Intelligence Team dubbed the new malware family "UpdateAgent," charting its evolution from a barebones information stealer to a second-stage payload distributor as part of multiple attack waves observed in 2021.
"The latest campaign saw the malware installing the evasive and persistent Adload adware, but UpdateAgent's ability to gain access to a device can theoretically be further leveraged to fetch other, potentially more dangerous payloads," the researchers said.
The actively in-development malware is said to be propagated via drive-by downloads or advertisement pop-ups that masquerade as legitimate software like video applications and support agents, even as the authors have made steady improvements that have transformed UpdateAgent into a progressively persistent piece of malware.
Chief among the advancements include the capability to abuse existing user permissions to surreptitiously perform malicious activities and circumvent macOS Gatekeeper controls, a security feature that ensures only trusted applications from identified developers can be installed on a system.
In addition, UpdateAgent has been found to take advantage of public cloud infrastructure, namely Amazon S3 and CloudFront services, to host its second-stage payloads, including adware, in the form of .DMG or .ZIP files.
Once installed, the Adload malware makes use of ad injection software and man-in-the-middle (MitM) techniques to intercept and reroute users' internet traffic through the attacker's servers to insert rogue ads into web pages and search engine results to increase the chances of multiple infections on the devices.
"UpdateAgent is uniquely characterized by its gradual upgrading of persistence techniques, a key feature that indicates this trojan will likely continue to use more sophisticated techniques in future campaigns," the researchers cautioned.
Related posts- Physical Pentest Tools
- Hack And Tools
- Hacker Tools For Mac
- Pentest Tools Free
- Hacker Tools
- Hack Tools For Windows
- Hack Apps
- Hack Tool Apk
- Hacker Tools For Mac
- Pentest Tools Find Subdomains
- Hack Tools Pc
- Github Hacking Tools
- Hack Tools Online
- Pentest Automation Tools
- Underground Hacker Sites
- Hacker Tools Apk
- Hack Rom Tools
- World No 1 Hacker Software
- Hacking Tools For Pc
- Pentest Tools Android
- Pentest Tools Kali Linux
- Tools For Hacker
- Pentest Tools Android
- Hacking Tools Download
- Pentest Tools Kali Linux
- Hack Tools Online
- Free Pentest Tools For Windows
- Hacker Tools
- Hacker Tool Kit
- Pentest Recon Tools
- Bluetooth Hacking Tools Kali
- Growth Hacker Tools
- Computer Hacker
- Hackrf Tools
- Hack Tools Pc
- Nsa Hacker Tools
- Tools For Hacker
- Best Hacking Tools 2020
- Hack Tools For Windows
- Hacking Tools For Windows 7
- Usb Pentest Tools
- Pentest Tools List
- Hacking Tools For Pc
- Hacking Tools Hardware
- Hacking Tools Usb
- How To Hack
- Hacking Tools
- Hacking Tools Online
- Hacking Tools And Software
- Nsa Hack Tools Download
- Hacking Tools 2020
- Hacker
- Hacker Tools For Ios
- Hacking Tools For Beginners
- Pentest Tools For Android
- Hacker Tools 2020
- Pentest Tools Url Fuzzer
- Pentest Tools Windows
- Pentest Tools Nmap
- Hacker Tools Mac
- Hacking Tools For Pc
- Hack Tool Apk
- Hacking App
- Hackrf Tools
- New Hack Tools
- Hack Rom Tools
- Pentest Tools Port Scanner
- Best Pentesting Tools 2018
- Pentest Tools For Windows
- Pentest Tools Online
- Pentest Tools Website Vulnerability
- How To Make Hacking Tools
- Game Hacking
- Wifi Hacker Tools For Windows
- Hacker
- New Hack Tools
- Hacking Tools Download
- Pentest Tools Apk
- Hacking Tools Mac
- Hacking Tools Usb
- Pentest Automation Tools
- Pentest Tools Subdomain
- Nsa Hack Tools Download
- Easy Hack Tools
- Hacking Tools
- Hacking Tools For Mac
- Kik Hack Tools
- What Is Hacking Tools
- Hacker Tools Online
- Pentest Tools Alternative
- Hacker Tools For Ios
- Hack Website Online Tool
- Hacker Tools Apk Download
- Hacking Tools Online
- Pentest Tools Open Source
- Hacking Tools 2020
- Best Pentesting Tools 2018
- Hacker Tools 2020
- Hacker Search Tools
- Best Hacking Tools 2019
- Hacking Tools For Mac
- Hacker Security Tools
- Hacker Hardware Tools
- Termux Hacking Tools 2019
- Easy Hack Tools
- Hacker Tools 2020
- Hacking Tools For Mac
- Pentest Tools Bluekeep
- Hack Tools For Ubuntu
- Hacking App
- Pentest Tools Website
- Pentest Tools Kali Linux
- Pentest Tools Review
- Hacker Tools Linux
- Hacker Tools 2020
- Pentest Tools For Mac
- Hacker Tools Free
- Pentest Recon Tools
- Pentest Tools Open Source
- Hacking Tools Github
- Physical Pentest Tools
- Hack Tools For Pc
- Pentest Reporting Tools
- Install Pentest Tools Ubuntu
- Hacking Tools For Beginners
- Pentest Tools Github
- Hacking App
- Nsa Hack Tools
- Hacking Tools Usb
- Pentest Tools Tcp Port Scanner
- Hack Tools Online
- Best Hacking Tools 2019
- Hacker Tools Free
- New Hack Tools
- Hacking Tools
- Hacker Tools List
- Nsa Hack Tools Download
- Hack Tools
- Pentest Tools Website
- Nsa Hack Tools Download
- Termux Hacking Tools 2019
- Hack Tools For Mac
- Hacking Tools For Pc
- Hacking Apps
- Hacker Tools Windows
- Hackers Toolbox
- Pentest Recon Tools
- Underground Hacker Sites
0 comments:
Post a Comment