Thursday, February 27, 2025
HomeAdwareBeware !! #1 Adware Removal Mac Store App "Adware Doctor" Spying &...

Beware !! #1 Adware Removal Mac Store App “Adware Doctor” Spying & Stealing Mac Users Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

One of the Top paid Apple’s Mac store App “Adware Doctor” spying the Mac users and steal the Users browsers history from the Safari browser.

Apple always claimed that the safest place to download apps for your Mac is the “Mac App Store” but this malicious activities of the most famous paid app leads to rising a lot of question against the Apple Privacy statement.

Adware Doctor was supposed to scan Mac computers for malware and remove suspicious files and Adware Doctor claims to be the “best app” to remove a variety of common adware threats which target Mac users.

Adware Doctor is one of the Top rated App and it was listed in the official Apple Website which is sitting among the top 4 App.

This App listed under ” Top paid utilities” which could cost  $4.99 and the detailed analysis showed that this app is developed by Chinese application’s developer, “Yongming Zhang”

Apart from that, This app initially posed as Adware medic and its owned by Malwarebytes which leads to pullout but it came back to the store when it changes its name as  Adware Doctor.

Adware Doctor Stealing Sensitive User Data Operation

Many of the users reported to Apple regarding this unusual behavior but Apple doesn’t care much and one of the recent tweet state that, Top Sold MacOS AppStore application is ROGUE. Adware Doctor is stealing your privacy.

Above Tweet that posted along with POC demonstrate that Adware Doctor collecting and stealthily exfiltrating a variety of sensitive user data including browser history.

Researchers performed an in-depth analysis using process monitor and retrieve the zip utility file to create a password-protected archive history.zip that was being uploaded to the Chinese server.

Adware Doctor.44148  open ~/Library/Containers/com.yelab.Browser-Sweeper/Data/Library
/Application Support/com.yelab.Browser-Sweeper/history.zip
According to objective-see, By editing the system’s /etc/hosts file we can redirect this request to a server we control can capture what Adware Doctor is trying to upload. And what do you think that might be? If you guessed the history.zip file you would be correct.

Since its a password protected file, they unzip the archive, entering webtool as the password and extracted that confirmed that  Adware Doctor is stealing your browser history.

Finally, Apple just removed Adware Doctor, a paid utility in the Mac App Store and the users who all are already downloaded this is strictly advised to remove from your computer in order to prevent yourself and keep your better privacy.

Also Read:

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

60,000 Android Devices are Infected with Malicious Battery Saver App that Steals Various Sensitive Data

MyloBot – Highly Sophisticated Botnet Shutdown Windows Defender & Blocking Ports on the Firewall

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing...

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing...

CISA Warns of Active Exploitation of Apple iOS & iPadOS Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of...

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app...