SELECT LANGUAGE BELOW

Hackers use pirated software to hijack Mac, Android and Windows devices

Join Fox News for access to this content

Plus, your account will give you exclusive access to select articles and other premium content for free.

Please enter a valid email address.

Enter your email address[続行]By pressing , you agree to Fox News’ Terms of Use and Privacy Policy, including notice of financial incentives. Please check your email and follow the instructions provided to access the content.

Need help? Click here.

Trading cryptocurrencies? Your digital wallet may contain a significant amount of money. It feels so good. But here are the pitfalls of digital currencies. Keeping digital currencies safe is not an easy task.

Hackers are working overtime to come up with new tricks to steal your cryptocurrency, potentially emptying your wallet in one fell swoop. Yes, your digital cash is the ultimate prize for cyber thieves. And the worst part? In most cases, you won’t even realize you’ve been victimized until your balance drops to zero.

Case in point: There is new malware specifically targeting macOS, Android, and Windows devices. They sneak in via pirated software, seek out cryptocurrencies and make them their own. Here’s how it works:

Click to get the free Cyberguy Newsletter in your cart, including security alerts, quick video tips, tech reviews, and easy how-tos to get smarter

A woman working on a Mac. (Kurt “Cyber ​​Guy” Knutson)

What is the new malware targeting virtual currency users?

Cyber ​​security company Kaspersky has discovered a sophisticated new malware campaign aimed at stealing cryptocurrencies from users’ wallets. This campaign exploits the common practice of searching for “free” versions of paid software online and uses pirated or improperly licensed software as a vector of infection.

These cracked applications are distributed through unauthorized websites and are embedded with Trojan proxy-type malware. As recent findings show, this malware is not limited to macOS users. Variants targeting Android and Windows platforms have also been discovered, connecting to the same command and control (C&C) servers. These variants, like their macOS counterparts, are hidden within cracked software, representing a wide range of risks across different operating systems.

Chicago Children’s Hospital regains access to medical records one month after cyberattack

Once the malware is downloaded to your device, it will immediately start checking for Bitcoin and Exodus. cryptocurrency wallet. If you discover either one (much to the chagrin of some users who have both), the malware will replace your wallet and infect you with another version that can steal your cryptocurrencies. For some people, this can amount to thousands of dollars. And it’s all because you unintentionally downloaded malware onto your macOS, Android, or Windows device.

mack hack 2

A woman typing on a Mac. (Kurt “Cyber ​​Guy” Knutson))

Read more: How criminals use skimmers and shimmers to steal money from ATM machines

How does this malware get onto your device?

Kaspersky reported that this new malware is being introduced through cracked software applications online. Cracked software has broken protection, making it easier for hackers to break into your software with code. This allowed the malware author to take a pre-compromised version of the pirated software (his xScope, an example is a paid macOS utility) and change a few bytes of code to get the job done.

Then, in February, security firm Jamf discovered another cryptocurrency-focused macOS malware circulating through pirated copies of Apple’s Final Cut Pro software.

An attacker could use this malware to use your device to obtain money or commit criminal acts. This is distributed as a .PKG installer. It contains a script that runs after installation, modifies system files, and sets up the malware to run as a system process.

What pirated application is this malware loaded into?

Pirated applications are versions of software that have been modified to remove or disable features that are only available in paid versions, such as activation. These applications are often distributed illegally without the consent of the software creator. These are identified as being loaded with this Trojan-Proxy malware.

CLICK HERE TO GET FOX BUSINESS ON THE GO

  • 4K image compressor
  • 4K Video Downloader Pro v4.24.3 macOS
  • Aiseesoft Mac Data Recovery
  • Aiseesoft Mac Video Converter Ultimate Edition
  • aravsoft
  • AnyMP4 Android Data Recovery for Mac
  • awe cleaner
  • downey 4
  • FonePaw Data Recovery
  • INet network scanner
  • mcdroid
  • MacX Video Converter Pro
  • mouse boost pro
  • M web pro
  • Net Shred X
  • NetWorker Pro
  • pathfinder
  • pattern node
  • completely clear workbench
  • Print to PDF
  • project office x
  • rocket typist
  • sketch
  • sponsor block
  • system toolkit
  • trans data
  • parchment
  • video duke
  • Wondershare Uniconverter 13
  • SQL Pro Studio
  • WinX HD Video Converter for Mac
  • art studio pro
  • magic sort list
  • FoneLab Mac Data Retriever
  • Apeaksoft Ultimate Video Converter for Mac

Additionally, malware campaigns have expanded beyond macOS, as evidenced by the fact that Android and Windows platforms are also targeted by malware that communicates with the same command and control servers. The applications or files identified on these platforms are:

  • Android: s276.apk, Swipis_v2.6.1[Mobile].apk
  • Windows: wsclient.exe

The lesson here is to avoid downloading pirated software from unauthorized sources to protect yourself from such malware infections.

mack hack 3

Woman typing on Mac laptop. (Kurt “Cyber ​​Guy” Knutson)

Read more: Stealthy backdoor MAC malware that can wipe your files

Deceptive “Activator” app and its crypto heist

When you download one of these apps, while you are trying to install the app, an “activator” launches and prompts you to enter your device username and password to install and launch the software.

If this is successful (or if it is unsuccessful for you), the hacker can spy on your device and receive commands from the server. This is when hackers perform their dirty work of searching through cryptocurrency wallets, exchanging them, and plundering the dough.

activator app. (Kurt “Cyber ​​Guy” Knutson)

More information: Beware of fake browser updates on your Mac

Another caveat Kaspersky mentioned about this particular malware is that it targets users with macOS Ventura 13.6, which was just released in September. We don’t know for sure, but it seems to suggest that if you haven’t done this, you might be safe from this hack this time.

Of course, if you don’t have any cryptocurrencies, that’s probably okay. However, this unique type of malware that uses pirated software to infiltrate devices is not that new. Hackers have used this method to exploit pirated software before, and they will do it again.

Click to get the free Cyber ​​Guy Newsletter in your cart with security alerts, quick video tips, tech reviews, and easy how-tos to get smarter

So how can you keep yourself safe?

Note that in order for a hacker to get malware onto your device, they have to download it. This is typically done by clicking on links or files that are suspicious, but not necessarily suspicious. In the case of this threat, hackers understand that crypto users are probably more tech-savvy than the average person and therefore more susceptible to hacks that exist out there. For this reason, hackers must find a way to trick users into downloading malware in the first place. Here are five things you can do to protect yourself.

1) Do not download pirated software. It’s not worth the risk to download pirated software. This exposes your device to potential security threats such as viruses and spyware. Downloading software from a trusted app store is a surefire way to protect your device.

2) Don’t click on suspicious links or files. If you come across a link that looks suspicious, misspelled, or unfamiliar, don’t click it. Instead, consider visiting the company’s website directly by entering the web address manually or by searching with a trusted search engine. Usually the first or second result you see is legitimate..

3) Update your device with software regularly. Regularly updating your device’s software is critical to your security as it ensures you receive the latest patches, bug fixes, and security enhancements. These updates help protect your device from vulnerabilities and potential threats that could be exploited by malicious attackers.

4) Consider storing your cryptocurrency wallet on an external hard drive. If you have cryptocurrencies, you can always consider storing them in a wallet. external hard drive. This method of storage means it is safe from hackers on the internet.

5) Use good antivirus software: The best way to protect yourself from clicking on malicious links that install malware that can access your personal information is to install antivirus protection on all your devices. This can also alert you to phishing emails and ransomware scams. Get my picks for the best antivirus protection products of 2024 for your Mac, Windows, Android, and iOS devices.

Cart important points

With a new day comes new malware targeting people who use Macs, Windows, and Android devices and have cryptocurrency wallets. This is a scary threat that can cost you a lot of money if you are not careful. However, you can protect yourself by following the steps above, so you can enjoy your cryptocurrency without worrying about losing it to hackers.

CLICK HERE TO GET THE FOX NEWS APP

Do you think government regulation should play a stronger role in protecting crypto users? Email us. Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter

Ask your cart a question or let us know your story you’d like us to feature.

Answers to CyberGuy frequently asked questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News