New Variant Of UpdateAgent Malware Infects Mac Computers With Adware
Microsoft on Wednesday shed light on a previously undocumented Mac trojan that it said has undergone several iterations since its first appearance in September 2020, effectively granting it an "increasing progression of sophisticated capabilities."
The company's Microsoft 365 Defender Threat Intelligence Team dubbed the new malware family "UpdateAgent," charting its evolution from a barebones information stealer to a second-stage payload distributor as part of multiple attack waves observed in 2021.
"The latest campaign saw the malware installing the evasive and persistent Adload adware, but UpdateAgent's ability to gain access to a device can theoretically be further leveraged to fetch other, potentially more dangerous payloads," the researchers said.
The actively in-development malware is said to be propagated via drive-by downloads or advertisement pop-ups that masquerade as legitimate software like video applications and support agents, even as the authors have made steady improvements that have transformed UpdateAgent into a progressively persistent piece of malware.
Chief among the advancements include the capability to abuse existing user permissions to surreptitiously perform malicious activities and circumvent macOS Gatekeeper controls, a security feature that ensures only trusted applications from identified developers can be installed on a system.
In addition, UpdateAgent has been found to take advantage of public cloud infrastructure, namely Amazon S3 and CloudFront services, to host its second-stage payloads, including adware, in the form of .DMG or .ZIP files.
Once installed, the Adload malware makes use of ad injection software and man-in-the-middle (MitM) techniques to intercept and reroute users' internet traffic through the attacker's servers to insert rogue ads into web pages and search engine results to increase the chances of multiple infections on the devices.
"UpdateAgent is uniquely characterized by its gradual upgrading of persistence techniques, a key feature that indicates this trojan will likely continue to use more sophisticated techniques in future campaigns," the researchers cautioned.
Related news- Hacker
- Hacking Tools For Games
- Hack Tools For Games
- Pentest Tools Website Vulnerability
- Pentest Tools Android
- Top Pentest Tools
- Pentest Tools Kali Linux
- Hacking Tools Usb
- Pentest Tools Bluekeep
- Hack Tools Pc
- Hacking Tools For Windows Free Download
- Hack Tool Apk
- Hacker Techniques Tools And Incident Handling
- Growth Hacker Tools
- Nsa Hack Tools
- Hacker Tools Hardware
- Pentest Tools Bluekeep
- Pentest Tools List
- Hack Tools For Ubuntu
- Hacks And Tools
- Free Pentest Tools For Windows
- Pentest Tools Apk
- Nsa Hack Tools
- Hack App
- Hack Rom Tools
- Hacker Tools 2020
- Top Pentest Tools
- Pentest Tools Bluekeep
- Ethical Hacker Tools
- Hacking Tools Software
- Hack Tools For Windows
- Hacking Tools
- Pentest Tools For Android
- Pentest Tools Nmap
- Pentest Tools Github
- Pentest Tools Subdomain
- Hack And Tools
- Hacking Tools For Windows 7
- Hacking Tools Kit
- Hacker Tools 2019
- Hacking Tools For Mac
- Hack Website Online Tool
- Pentest Tools Android
- Hacking Tools Download
- Github Hacking Tools
- Hacker Tools 2019
- New Hacker Tools
- Hack Tools
- Bluetooth Hacking Tools Kali
- Pentest Tools Github
- Github Hacking Tools
- Hacking Tools For Mac
- Best Hacking Tools 2020
- Pentest Tools Tcp Port Scanner
- Hack App
- Pentest Tools Website
- Hacker Tools Github
- Hacking Tools For Beginners
- Hacking Tools
- Hack Tools For Mac
- Hacker Tools Mac
- Hacking Tools Github
- Hack Tool Apk
- Termux Hacking Tools 2019
- Hacking Tools Windows 10
- Hacking Tools And Software
- Hak5 Tools
- Hacking Tools Mac
- Nsa Hack Tools Download
- Hacking Tools
- Pentest Tools For Mac
- Kik Hack Tools
- Hacker Tools Apk Download
- Hack Tools Download
- Hacking Tools For Windows
- Pentest Tools Find Subdomains
- Hacking Tools Hardware
- Pentest Tools Windows
- Hacker Tools Linux
- Hacking Tools For Windows 7
- Hacker Tools Mac
- Hacking Tools For Windows 7
- Tools Used For Hacking
- Hacking Tools Software
- Hacking Tools Pc
- Pentest Tools Framework
- Hacking Tools Hardware
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Website Vulnerability
- Blackhat Hacker Tools
- Hacker Tools For Windows
- Hacking Tools 2019
- Hacks And Tools
- New Hack Tools
- Hacking Tools Kit
- Hacks And Tools
- Hacking Tools For Windows
- Pentest Box Tools Download
- Hacker Tools List
- Hack App
- Pentest Tools Online
- Hacking Tools And Software
- Hack Tools For Windows
- Hacker Hardware Tools
- Hack Tools Github
- Wifi Hacker Tools For Windows
- Hacking Tools Mac
- Hack Website Online Tool
- New Hack Tools
- Kik Hack Tools
- Hack Tools For Games
- Hacker Tools Free
- Nsa Hacker Tools
- Hack Tools For Windows
- Blackhat Hacker Tools
- Hacking Tools Hardware
- Hack Tools For Pc
- Hacking Tools
- Hacker Tools Free Download
- Kik Hack Tools
- Hacking Tools For Beginners
- Hacker Tools Windows
- Hack Tools For Pc
- Hacking Tools Software
- Underground Hacker Sites
- Hack And Tools
- Hack App
- Hacker Search Tools
- Hacker Security Tools
- Pentest Tools Windows
- Hacker Tools For Windows
- Pentest Tools Alternative
- Pentest Box Tools Download
- Best Hacking Tools 2019
- Hack Website Online Tool
- Computer Hacker
- Pentest Tools Website Vulnerability
- Bluetooth Hacking Tools Kali
- Hacker Tools For Mac
- Easy Hack Tools
- Hack Apps
- Pentest Tools For Android
- Best Pentesting Tools 2018
- Kik Hack Tools
- Hacker
- Pentest Tools For Android
- Wifi Hacker Tools For Windows
- Hacker Tools 2020
- Pentest Automation Tools
- Hack Tools 2019
- Best Hacking Tools 2020
- Pentest Tools For Android
- Hack Tools For Mac
No comments:
Post a Comment