New Variant Of UpdateAgent Malware Infects Mac Computers With Adware
Microsoft on Wednesday shed light on a previously undocumented Mac trojan that it said has undergone several iterations since its first appearance in September 2020, effectively granting it an "increasing progression of sophisticated capabilities."
The company's Microsoft 365 Defender Threat Intelligence Team dubbed the new malware family "UpdateAgent," charting its evolution from a barebones information stealer to a second-stage payload distributor as part of multiple attack waves observed in 2021.
"The latest campaign saw the malware installing the evasive and persistent Adload adware, but UpdateAgent's ability to gain access to a device can theoretically be further leveraged to fetch other, potentially more dangerous payloads," the researchers said.
The actively in-development malware is said to be propagated via drive-by downloads or advertisement pop-ups that masquerade as legitimate software like video applications and support agents, even as the authors have made steady improvements that have transformed UpdateAgent into a progressively persistent piece of malware.
Chief among the advancements include the capability to abuse existing user permissions to surreptitiously perform malicious activities and circumvent macOS Gatekeeper controls, a security feature that ensures only trusted applications from identified developers can be installed on a system.
In addition, UpdateAgent has been found to take advantage of public cloud infrastructure, namely Amazon S3 and CloudFront services, to host its second-stage payloads, including adware, in the form of .DMG or .ZIP files.
Once installed, the Adload malware makes use of ad injection software and man-in-the-middle (MitM) techniques to intercept and reroute users' internet traffic through the attacker's servers to insert rogue ads into web pages and search engine results to increase the chances of multiple infections on the devices.
"UpdateAgent is uniquely characterized by its gradual upgrading of persistence techniques, a key feature that indicates this trojan will likely continue to use more sophisticated techniques in future campaigns," the researchers cautioned.
More articles- Hacking Tools Windows
- Growth Hacker Tools
- Hacking Tools And Software
- Pentest Tools For Windows
- World No 1 Hacker Software
- Pentest Tools List
- Pentest Recon Tools
- Hack Tools
- Pentest Tools Github
- Hacking Tools Free Download
- Hacking Tools Kit
- What Are Hacking Tools
- Hacker Hardware Tools
- Pentest Tools Online
- Hak5 Tools
- Pentest Tools Bluekeep
- Hacker Tool Kit
- Hacking Tools And Software
- Hack Tools
- Pentest Tools Windows
- Hacker Search Tools
- Hacker Tools Software
- Hacker Tools Windows
- Pentest Tools Nmap
- Pentest Automation Tools
- Hack Tools For Pc
- Hacker Tools Apk
- Hacker Tools Mac
- Hacker Tools Github
- Hacker Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Find Subdomains
- What Are Hacking Tools
- Hacker Hardware Tools
- Computer Hacker
- Hacker Tools Hardware
- Hacker Search Tools
- Hack Tools Pc
- What Is Hacking Tools
- Usb Pentest Tools
- Hacking Tools Download
- Hack And Tools
- How To Hack
- Pentest Box Tools Download
- Ethical Hacker Tools
- Pentest Tools Github
- Pentest Tools For Mac
- Hack Tool Apk No Root
- Hacking Tools Github
- Wifi Hacker Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hacker Tools For Ios
- Beginner Hacker Tools
- Pentest Tools Kali Linux
- Pentest Tools List
- Hacker Tools Free
- Wifi Hacker Tools For Windows
- Hack Rom Tools
- Github Hacking Tools
- Hack Tools Mac
- Pentest Tools Website Vulnerability
- Bluetooth Hacking Tools Kali
- What Are Hacking Tools
- Hackrf Tools
- Hacking Tools Name
- Hacking Tools 2020
- Hacker Tools For Ios
- Pentest Tools For Mac
- Hacker Tools Windows
- Pentest Tools Subdomain
- Hacker Tools Windows
- New Hacker Tools
- Hack Website Online Tool
- Hacker Tools For Ios
- Hacking App
- Pentest Automation Tools
- Hacker Tools Hardware
- Black Hat Hacker Tools
- Hacking Tools For Beginners
- Hak5 Tools
- Pentest Reporting Tools
- Hack And Tools
- Pentest Tools Subdomain
- Android Hack Tools Github
- Computer Hacker
- Hack Apps
- Hacking Tools For Beginners
- Wifi Hacker Tools For Windows
- Beginner Hacker Tools
- Hacking Tools Usb
- Hack Tools For Ubuntu
- Hacker Tools For Pc
- Android Hack Tools Github
- Pentest Tools Framework
- Pentest Recon Tools
- Hack Tools Pc
- Pentest Tools For Mac
- Hacking Tools 2020
- How To Install Pentest Tools In Ubuntu
- Termux Hacking Tools 2019
- Pentest Recon Tools
- How To Make Hacking Tools
- Hacker Tools For Ios
- Pentest Tools For Android
- Tools 4 Hack
- Nsa Hack Tools
- Android Hack Tools Github
- How To Install Pentest Tools In Ubuntu
- Hack Tools Download
- Pentest Tools Alternative
- New Hack Tools
- Hacking Tools Mac
- Hack Tools For Games
- Hacking Tools Pc
- Hak5 Tools
- Hacker Tools For Mac
- Hacking Tools Software
- Hack Tools For Games
- How To Make Hacking Tools
- Pentest Tools Website
- Hacker Security Tools
- Hacker Tool Kit
- Hacker Tools For Pc
- Pentest Tools Github
- Hack Tools Pc
- Kik Hack Tools
- Pentest Tools Open Source
- Hackrf Tools
- Hacker Tools For Ios
- Hack Tools Download
- Best Pentesting Tools 2018
- Tools For Hacker
- Pentest Tools Online
- New Hack Tools
- Hacker Security Tools
- Hacking App
- Hacker Tools Online
- Underground Hacker Sites
- Pentest Tools Subdomain
- Hacker Hardware Tools
- Pentest Box Tools Download
- Hacking Tools Name
- Ethical Hacker Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Name
- Hacking Tools Online
- Hacker Tools List
- New Hacker Tools
- Hack Tools
- Pentest Tools Port Scanner
- Pentest Tools Linux
- Pentest Tools Framework
- Usb Pentest Tools
- Hacker Hardware Tools
0 Response to "New Variant Of UpdateAgent Malware Infects Mac Computers With Adware"
Post a Comment