Monday, March 31, 2025
HomeAdwareBeware !! #1 Adware Removal Mac Store App "Adware Doctor" Spying &...

Beware !! #1 Adware Removal Mac Store App “Adware Doctor” Spying & Stealing Mac Users Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

One of the Top paid Apple’s Mac store App “Adware Doctor” spying the Mac users and steal the Users browsers history from the Safari browser.

Apple always claimed that the safest place to download apps for your Mac is the “Mac App Store” but this malicious activities of the most famous paid app leads to rising a lot of question against the Apple Privacy statement.

Adware Doctor was supposed to scan Mac computers for malware and remove suspicious files and Adware Doctor claims to be the “best app” to remove a variety of common adware threats which target Mac users.

Adware Doctor is one of the Top rated App and it was listed in the official Apple Website which is sitting among the top 4 App.

This App listed under ” Top paid utilities” which could cost  $4.99 and the detailed analysis showed that this app is developed by Chinese application’s developer, “Yongming Zhang”

Apart from that, This app initially posed as Adware medic and its owned by Malwarebytes which leads to pullout but it came back to the store when it changes its name as  Adware Doctor.

Adware Doctor Stealing Sensitive User Data Operation

Many of the users reported to Apple regarding this unusual behavior but Apple doesn’t care much and one of the recent tweet state that, Top Sold MacOS AppStore application is ROGUE. Adware Doctor is stealing your privacy.

Above Tweet that posted along with POC demonstrate that Adware Doctor collecting and stealthily exfiltrating a variety of sensitive user data including browser history.

Researchers performed an in-depth analysis using process monitor and retrieve the zip utility file to create a password-protected archive history.zip that was being uploaded to the Chinese server.

Adware Doctor.44148  open ~/Library/Containers/com.yelab.Browser-Sweeper/Data/Library
/Application Support/com.yelab.Browser-Sweeper/history.zip
According to objective-see, By editing the system’s /etc/hosts file we can redirect this request to a server we control can capture what Adware Doctor is trying to upload. And what do you think that might be? If you guessed the history.zip file you would be correct.

Since its a password protected file, they unzip the archive, entering webtool as the password and extracted that confirmed that  Adware Doctor is stealing your browser history.

Finally, Apple just removed Adware Doctor, a paid utility in the Mac App Store and the users who all are already downloaded this is strictly advised to remove from your computer in order to prevent yourself and keep your better privacy.

Also Read:

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

60,000 Android Devices are Infected with Malicious Battery Saver App that Steals Various Sensitive Data

MyloBot – Highly Sophisticated Botnet Shutdown Windows Defender & Blocking Ports on the Firewall

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility...

Windows 11 Insider Released – Microsoft Removes BypassNRO.cmd Script to Enhance Security

Microsoft has launched Windows 11 Insider Preview Build 26200.5516 to the Dev Channel with exciting new...

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Apple iOS 18.4 Beta 3 Released – What’s New!

Apple released iOS 18.4 Beta 3 on March 10, 2025, for developers, with a...

Trigon: Latest iOS Kernel Exploit Uncovered

A sophisticated kernel exploit leveraging CVE-2023-32434, an integer overflow vulnerability in Apple’s XNU virtual...

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing...