If you use a Mac, you may be exposed to two new threats. Apple has a reputation for having robust security, but these two pieces of malware are designed to trick users and steal data.
Jamf Threat Labs, an organization focused on the safety of Apple products, says malware threats are part of security. year-long attack For Mac systems.
The group says hackers are using them to collect data. The institute says such attacks occur all the time. That makes it even more important for people using Macs to make sure their data is locked down.
According to the institute, it is important to note that these hackers are primarily targeting the cryptocurrency industry, putting these individuals in particular at risk. That said, all Mac users still need to be careful.
MacBook Pro (Kurt “Cyber Guy” Knutson)
Malware disguised as an advertisement
Before entering the malware, Let’s talk about Arc Browser. For those who aren’t familiar with Arc Browser, it’s a Mac web browser that aims to provide a unique experience to its users. First and foremost, the main focus is on the web page. All the buttons found in traditional browsers have been relegated to the sidebar. Use a bookmark system that provides multiple workspaces. There is also an automatic tab management feature.
In other words, many Mac users will consider Arc Browser to be an upgrade to the already included Safari. And its popularity is increasing, making it a big target for hackers.

Genuine Arc Browser website (Kurt “Cyber Guy” Knutson)
Read more: How cryptocurrency scammers use CALENDY to infect your Mac with malware
How Fake Ads in Arc Web Browser Hide Dangerous Malware
In this attack, the hacker hides the malware in an ad disguised as an Arc Browser ad, as shown below.

Malicious site alicl[.]net that mimics the regular arc.net (Jamf Threat Lab)
The ads are redirected to similar malicious sites (arc.net and aricl.net).
instead of taking you to a regular place download page In the case of the Arc web browser, the advertisements redirect you to similar malicious sites. Alikul[.]Netan imitation of the original arcnet and host malware.

Malicious Alikul image[.]internet site (Jamf Threat Lab)
Malware disguised as Arc Browser unleashes Atomic Stealer
When you download malware disguised as Arc Browser, it unleashes an Atomic stealer. This is a fake prompt that looks like a normal System Preferences prompt asking for a password. Once a hacker has access to your system passwords, they can steal other data.

Fake system preference prompt (Jamf Threat Lab)
Even worse, these so-called “ads” can appear as sponsored ads in Google searches. According to Jamf Threat Labs, these links can only be accessed through generated sponsored links and cannot be accessed directly. Attempts to directly access the malicious website returned an error message. This is probably done to avoid detection.
fake conferencing software
Jamf Threat Labs researchers also discovered a fake website offering hidden malware as free group meeting scheduling software.meat hub[.]gg seems to be legitimate. The company posts articles on his Medium, where he has over 8,000 followers at the time of publication. However, it hosts malware related to Realst, another malware designed to deplete cryptocurrency wallets.
Some attacks involving Meethub also use social engineering. Hackers may approach victims asking for a job or podcast interview. In order to meet, they ask the victim to download Meethub software. According to Jamf, these attacks can result in high rewards for hackers.

Meethub website (Jamf Threat Lab)
how to protect yourself
1. Do not download pirated software. It’s not worth the risk to download pirated software. It exposes your device to potential security threats such as viruses and spyware. If someone sends you a download link via email, make sure it comes from a trusted source and scan it.
2. Don’t click on suspicious links or files. If you come across a link that looks suspicious, misspelled, or unfamiliar, don’t click it. Instead, consider visiting the company’s website directly by entering the web address manually or by searching with a trusted search engine. In most cases, The first or second result you see is legitimate. If you see the word “Sponsored” above the search results, wait a moment before clicking on it, and then consider clicking on the result below it.
3. Use good antivirus software. The best way to protect yourself from clicking on malicious links that install malware that can access your personal information is to install antivirus protection on all your devices. This can also alert you to phishing emails and ransomware scams. Get my picks for the best antivirus protection products of 2024 for your Mac, Windows, Android, and iOS devices.
Read more: Stealthy backdoor MAC malware that can wipe your files
What to do if you get hacked
If a hack has already occurred and you have been hacked, you should take immediate action to minimize the damage and protect your device. Below are some steps you can take.
change password
If hackers have recorded your passwords, they can access your online accounts and steal your data and money. You should change the passwords for all important accounts, such as email, banking, and social media, on another device (such as a laptop or desktop). I would like to do this on a separate device so hackers don’t record it. Set a new password on your hacked device. You should also use strong, unique passwords that are difficult to guess or crack.You can also use password manager Generate passwords and store them securely.
Enable two-factor authentication
must be activated two-factor authentication For an extra layer of security.
CLICK HERE TO GET FOX BUSINESS ON THE GO
Monitor your account and transactions
You should regularly check your online accounts and transactions for suspicious or fraudulent activity. If you notice anything unusual, report it to your service provider or authorities immediately. You should also check your credit report and score for signs of identity theft or fraud.
Use identity theft protection
Identity theft protection companies monitor personal information such as your home title, social security number, phone number, and email address and alert you if it is used to open an account. It can also help freeze bank and credit card accounts to prevent further misuse by criminals. Check out our tips and recommendations on how to protect yourself from identity theft.
Please contact your bank or credit card company
If a hacker obtains your banking or credit card information, they can use it to make purchases or withdrawals without your consent. You must notify your bank or credit card company of the situation. We can help you freeze or cancel your card, dispute fraudulent charges, or issue a new card.
Alert a contact
If a hacker gains access to your email or social media accounts, they could use them to send spam or emails. phishing message to your contacts. They may also pretend to be you and request money or personal information. You should alert your contacts and warn them not to open or reply to messages from you that seem suspicious or unusual.
Read more: How iPhone security flaws can lock you out
Cart important points
Macs are generally secure devices, but that doesn’t stop hackers from stealing data. In fact, these two new attacks demonstrate just how creative you can get when trying to break into your devices. That’s why it’s so important to have good antivirus software and safety measures in place.
Proper safety measures are even more important for people trading and using cryptocurrencies in such specific situations. As mentioned earlier, these attacks primarily focus on exfiltrating cryptocurrency wallets. And while anyone can be hacked, the risk is higher for cryptocurrency users. Therefore, please take the time to evaluate links before clicking on them. Don’t just download software just because someone tells you to. Please research. After all, it helps keep your data and wallet safe.
CLICK HERE TO GET THE FOX NEWS APP
Are you worried that hackers will find more creative ways to break into your computer? If you use cryptocurrency, how do you keep your cryptocurrency wallet safe? Please let us know by email. Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter
Ask your cart a question or let us know your story you’d like us to feature
Answers to CyberGuy frequently asked questions:
Copyright 2024 CyberGuy.com. All rights reserved.





