Tuesday, February 18, 2025
HomeMalwareDOS attack on Mac OS - Push fake alarms to Scare Users

DOS attack on Mac OS – Push fake alarms to Scare Users

Published on

SIEM as a Service

Follow Us on Google News

One of the essential vectors for the delivery of technical support scams is malvertising. You’ll basically be browsing the web page then unexpectedly your program demonstrates a terrifying page guaranteeing your PC is infected.

Recently, there has been a pattern for scammers to cause denial-of-service attacks against user’s computers.

A lot of fake PC technical support campaigns finds their victims through cool calling. Be that as it may, these tricks are advancing to end up distinctly more like watering-opening methods, by demonstrating Malicious promotions for the assumed technical support.

Today security specialists at Malware bytes group found yet another procedure that targets Mac OS clients running Safari.

A recently registered scam site focusing on Mac clients was making the rounds toward the end of last year.

Basically going to the malicious site on an older version of MacOS would begin making a sequence of email drafts, which in the long run cause the machine to come up short on memory and stop.

DOS attack on Mac OS - Push fake alarms to Scare Users

The malicious website page will first decide the version of OS X with a client user agent check and push two distinct forms of DOS attack.

if ((navigator.userAgent.match(/OS 10.1.1/i))) {
 location.replace("");
}
else if ((navigator.userAgent.match(/OS 10.2/i))) {
 location.replace("");
}else
{
location.replace("");}

The first variation has code that will continue drafting messages (yet does not really send them) incrementally and cover the past open windows.

DOS attack on Mac OS - Push fake alarms to Scare Users

The second variant(11.php) will rather open iTunes:

DOS attack on Mac OS - Push fake alarms to Scare Users

Defences:

These defects may have been settled with MacOS Sierra 10.12.2 as Mac clients running a fully up-to-date OS don’t seem to be influenced by the Mail application DoS.

Be that as it may, the second variation seems to now be capable of opening up iTunes, without any alert in Safari:

Try not to fall for these sorts of scams, More essentially, please caution your family and companions about them.Update your OS, focusing on the security updates.

Latest articles

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

A recent study by researchers from the National University of Singapore and NCS Cyber...

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

A sophisticated malware campaign leveraging the Lumma InfoStealer has been identified, targeting educational institutions...

Cybercriminals Embedded Credit Card Stealer Script Within <img> Tag

Cybersecurity researchers have uncovered a new MageCart malware campaign targeting e-commerce websites running on...

EagerBee Malware Targets Government Agencies & ISPs with Stealthy Backdoor Attack

A sophisticated cyber espionage campaign leveraging the EagerBee malware has been targeting government agencies...