Thursday, April 17, 2025
HomeMalwareDOS attack on Mac OS - Push fake alarms to Scare Users

DOS attack on Mac OS – Push fake alarms to Scare Users

Published on

SIEM as a Service

Follow Us on Google News

One of the essential vectors for the delivery of technical support scams is malvertising. You’ll basically be browsing the web page then unexpectedly your program demonstrates a terrifying page guaranteeing your PC is infected.

Recently, there has been a pattern for scammers to cause denial-of-service attacks against user’s computers.

A lot of fake PC technical support campaigns finds their victims through cool calling. Be that as it may, these tricks are advancing to end up distinctly more like watering-opening methods, by demonstrating Malicious promotions for the assumed technical support.

- Advertisement - Google News

Today security specialists at Malware bytes group found yet another procedure that targets Mac OS clients running Safari.

A recently registered scam site focusing on Mac clients was making the rounds toward the end of last year.

Basically going to the malicious site on an older version of MacOS would begin making a sequence of email drafts, which in the long run cause the machine to come up short on memory and stop.

DOS attack on Mac OS - Push fake alarms to Scare Users

The malicious website page will first decide the version of OS X with a client user agent check and push two distinct forms of DOS attack.

if ((navigator.userAgent.match(/OS 10.1.1/i))) {
 location.replace("");
}
else if ((navigator.userAgent.match(/OS 10.2/i))) {
 location.replace("");
}else
{
location.replace("");}

The first variation has code that will continue drafting messages (yet does not really send them) incrementally and cover the past open windows.

DOS attack on Mac OS - Push fake alarms to Scare Users

The second variant(11.php) will rather open iTunes:

DOS attack on Mac OS - Push fake alarms to Scare Users

Defences:

These defects may have been settled with MacOS Sierra 10.12.2 as Mac clients running a fully up-to-date OS don’t seem to be influenced by the Mail application DoS.

Be that as it may, the second variation seems to now be capable of opening up iTunes, without any alert in Safari:

Try not to fall for these sorts of scams, More essentially, please caution your family and companions about them.Update your OS, focusing on the security updates.

Latest articles

Hacker Leaks 33,000 Employee Records in Third-Party API Breach

A hacker has exposed the personal records of over 33,000 employees after discovering unrestricted...

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers

Google has announced the removal of 5.5 billion malicious advertisements and the suspension of...

CISA Issues Alert on SonicWall Flaw Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert after...

Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links

Cisco has disclosed a high-severity vulnerability in its widely used Webex App, warning users...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been...

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted...

Malicious Macros Return in Sophisticated Phishing Campaigns

The cybersecurity landscape of 2025 is witnessing a troubling resurgence of malicious macros in...