SELECT LANGUAGE BELOW

Two new stealthy malware threats are targeting those of you who use Macs

Subscribe to Fox News to access this content

Plus, your account will give you exclusive access to select articles and other premium content for free.

Please enter a valid email address.

Enter your email address[続行]By pressing , you agree to Fox News’ Terms of Use and Privacy Policy, including notice of financial incentives. Please check your email and follow the instructions provided to access the content.

Need help? Click here.

If you use a Mac, you may be exposed to two new threats. Apple has a reputation for having robust security, but these two pieces of malware are designed to trick users and steal data.

Jamf Threat Labs, an organization focused on the safety of Apple products, says malware threats are part of security. year-long attack For Mac systems.

The group says hackers are using them to collect data. The institute says such attacks occur all the time. That makes it even more important for people using Macs to make sure their data is locked down.

According to the institute, it is important to note that these hackers are primarily targeting the cryptocurrency industry, putting these individuals in particular at risk. That said, all Mac users still need to be careful.

Click to get the free Cyber ​​Guy Newsletter in your cart with security alerts, quick video tips, tech reviews, and easy how-tos to get smarter

MacBook Pro (Kurt “Cyber ​​Guy” Knutson)

Malware disguised as an advertisement

Before entering the malware, Let’s talk about Arc Browser. For those who aren’t familiar with Arc Browser, it’s a Mac web browser that aims to provide a unique experience to its users. First and foremost, the main focus is on the web page. All the buttons found in traditional browsers have been relegated to the sidebar. Use a bookmark system that provides multiple workspaces. There is also an automatic tab management feature.

In other words, many Mac users will consider Arc Browser to be an upgrade to the already included Safari. And its popularity is increasing, making it a big target for hackers.

ARC browser

Genuine Arc Browser website (Kurt “Cyber ​​Guy” Knutson)

Read more: How cryptocurrency scammers use CALENDY to infect your Mac with malware

How Fake Ads in Arc Web Browser Hide Dangerous Malware

In this attack, the hacker hides the malware in an ad disguised as an Arc Browser ad, as shown below.

fake arc site

Malicious site alicl[.]net that mimics the regular arc.net (Jamf Threat Lab)

The ads are redirected to similar malicious sites (arc.net and aricl.net).

instead of taking you to a regular place download page In the case of the Arc web browser, the advertisements redirect you to similar malicious sites. Alikul[.]Netan imitation of the original arcnet and host malware.

fake arc site 2

Malicious Alikul image[.]internet site (Jamf Threat Lab)

Malware disguised as Arc Browser unleashes Atomic Stealer

When you download malware disguised as Arc Browser, it unleashes an Atomic stealer. This is a fake prompt that looks like a normal System Preferences prompt asking for a password. Once a hacker has access to your system passwords, they can steal other data.

System preferences

Fake system preference prompt (Jamf Threat Lab)

Even worse, these so-called “ads” can appear as sponsored ads in Google searches. According to Jamf Threat Labs, these links can only be accessed through generated sponsored links and cannot be accessed directly. Attempts to directly access the malicious website returned an error message. This is probably done to avoid detection.

fake conferencing software

Jamf Threat Labs researchers also discovered a fake website offering hidden malware as free group meeting scheduling software.meat hub[.]gg seems to be legitimate. The company posts articles on his Medium, where he has over 8,000 followers at the time of publication. However, it hosts malware related to Realst, another malware designed to deplete cryptocurrency wallets.

Some attacks involving Meethub also use social engineering. Hackers may approach victims asking for a job or podcast interview. In order to meet, they ask the victim to download Meethub software. According to Jamf, these attacks can result in high rewards for hackers.

stealth malware 2

Meethub website (Jamf Threat Lab)

how to protect yourself

1. Do not download pirated software. It’s not worth the risk to download pirated software. It exposes your device to potential security threats such as viruses and spyware. If someone sends you a download link via email, make sure it comes from a trusted source and scan it.

2. Don’t click on suspicious links or files. If you come across a link that looks suspicious, misspelled, or unfamiliar, don’t click it. Instead, consider visiting the company’s website directly by entering the web address manually or by searching with a trusted search engine. In most cases, The first or second result you see is legitimate. If you see the word “Sponsored” above the search results, wait a moment before clicking on it, and then consider clicking on the result below it.

3. Use good antivirus software. The best way to protect yourself from clicking on malicious links that install malware that can access your personal information is to install antivirus protection on all your devices. This can also alert you to phishing emails and ransomware scams. Get my picks for the best antivirus protection products of 2024 for your Mac, Windows, Android, and iOS devices.

Read more: Stealthy backdoor MAC malware that can wipe your files

What to do if you get hacked

If a hack has already occurred and you have been hacked, you should take immediate action to minimize the damage and protect your device. Below are some steps you can take.

change password

If hackers have recorded your passwords, they can access your online accounts and steal your data and money. You should change the passwords for all important accounts, such as email, banking, and social media, on another device (such as a laptop or desktop). I would like to do this on a separate device so hackers don’t record it. Set a new password on your hacked device. You should also use strong, unique passwords that are difficult to guess or crack.You can also use password manager Generate passwords and store them securely.

Enable two-factor authentication

must be activated two-factor authentication For an extra layer of security.

CLICK HERE TO GET FOX BUSINESS ON THE GO

Monitor your account and transactions

You should regularly check your online accounts and transactions for suspicious or fraudulent activity. If you notice anything unusual, report it to your service provider or authorities immediately. You should also check your credit report and score for signs of identity theft or fraud.

Use identity theft protection

Identity theft protection companies monitor personal information such as your home title, social security number, phone number, and email address and alert you if it is used to open an account. It can also help freeze bank and credit card accounts to prevent further misuse by criminals. Check out our tips and recommendations on how to protect yourself from identity theft.

Please contact your bank or credit card company

If a hacker obtains your banking or credit card information, they can use it to make purchases or withdrawals without your consent. You must notify your bank or credit card company of the situation. We can help you freeze or cancel your card, dispute fraudulent charges, or issue a new card.

Alert a contact

If a hacker gains access to your email or social media accounts, they could use them to send spam or emails. phishing message to your contacts. They may also pretend to be you and request money or personal information. You should alert your contacts and warn them not to open or reply to messages from you that seem suspicious or unusual.

Read more: How iPhone security flaws can lock you out

Cart important points

Macs are generally secure devices, but that doesn’t stop hackers from stealing data. In fact, these two new attacks demonstrate just how creative you can get when trying to break into your devices. That’s why it’s so important to have good antivirus software and safety measures in place.

Proper safety measures are even more important for people trading and using cryptocurrencies in such specific situations. As mentioned earlier, these attacks primarily focus on exfiltrating cryptocurrency wallets. And while anyone can be hacked, the risk is higher for cryptocurrency users. Therefore, please take the time to evaluate links before clicking on them. Don’t just download software just because someone tells you to. Please research. After all, it helps keep your data and wallet safe.

CLICK HERE TO GET THE FOX NEWS APP

Are you worried that hackers will find more creative ways to break into your computer? If you use cryptocurrency, how do you keep your cryptocurrency wallet safe? Please let us know by email. Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter

Ask your cart a question or let us know your story you’d like us to feature

Answers to CyberGuy frequently asked questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News