Article Details
Scrape Timestamp (UTC): 2024-03-30 07:21:43.897
Source: https://thehackernews.com/2024/03/hackers-target-macos-users-with.html
Original Article Text
Click to Toggle View
Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware. Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims' Macs, but operate with the end goal of stealing sensitive data, Jamf Threat Labs said in a report published Friday. One such attack chain targets users searching for Arc Browser on search engines like Google to serve bogus ads that redirect users to look-alike sites ("airci[.]net") that serve the malware. "Interestingly, the malicious website cannot be accessed directly, as it returns an error," security researchers Jaron Bradley, Ferdous Saljooki, and Maggie Zirnhelt said. "It can only be accessed through a generated sponsored link, presumably to evade detection." The disk image file downloaded from the counterfeit website ("ArcSetup.dmg") delivers Atomic Stealer, which is known to request users to enter their system passwords via a fake prompt and ultimately facilitate information theft. Jamf said it also discovered a phony website called meethub[.]gg that claims to offer a free group meeting scheduling software, but actually installs another stealer malware capable of harvesting users' keychain data, stored credentials in web browsers, and information from cryptocurrency wallets. Much like Atomic stealer, the malware – which is said to overlap with a Rust-based stealer family known as Realst – also prompts the user for their macOS login password using an AppleScript call to carry out its malicious actions. Attacks leveraging this malware are said to have approached victims under the pretext of discussing job opportunities and interviewing them for a podcast, subsequently asking them to download an app from meethub[.]gg to join a video conference provided in the meeting invites. "These attacks are often focused on those in the crypto industry as such efforts can lead to large payouts for attackers," the researchers said. "Those in the industry should be hyper-aware that it's often easy to find public information that they are asset holders or can easily be tied to a company that puts them in this industry." The development comes as MacPaw's cybersecurity division Moonlock Lab disclosed that malicious DMG files ("App_v1.0.4.dmg") are being used by threat actors to deploy a stealer malware designed to extract credentials and data from various applications. This is accomplished by means of an obfuscated AppleScript and bash payload that's retrieved from a Russian IP address, the former of which is used to launch a deceptive prompt (as mentioned above) to trick users into providing the system passwords. "Disguised as a harmless DMG file, it tricks the user into installation via a phishing image, persuading the user to bypass macOS's Gatekeeper security feature," security researcher Mykhailo Hrebeniuk said. The development is an indication that macOS environments are increasingly under threat from stealer attacks, with some strains even boasting of sophisticated anti-virtualization techniques by activating a self-destructing kill switch to evade detection. In recent weeks, malvertising campaigns have also been observed pushing the FakeBat loader (aka EugenLoader) and other information stealers like Rhadamanthys via a Go-based loader through decoy sites for popular software such as Notion and PuTTY. The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class Internet intelligence from Censys Search.
Daily Brief Summary
Cybersecurity researchers at Jamf Threat Labs have identified an ongoing campaign targeting macOS users, utilizing malicious ads and fake websites to distribute two types of stealer malware.
Victims searching for Arc Browser are lured by bogus ads on search engines to malicious sites that cannot be accessed directly, indicating tactics to avoid detection.
The downloaded disk image files prompt users to enter their system passwords, which facilitate the theft of sensitive information.
One of the malware disguises itself as a free group meeting scheduling software on a phony site named meethub[.]gg, aiming to extract credentials from keychains, browsers, and cryptocurrency wallets.
Attackers engage potential victims with job or podcast interview propositions and direct them to download an application for a video conference, specifically targeting individuals in the cryptocurrency industry.
Additional threats include malicious DMG files spreading stealer malware with obfuscated AppleScript and payloads from a Russian IP address, designed to circumvent macOS Gatekeeper security.
MacPaw's Moonlock Lab warns of threat actors using sophisticated anti-virtualization techniques and self-destruct mechanisms in stealer attacks to escape detection.
These reports underscore the increasing threats to macOS users and the importance of heightened awareness and security measures.