Saturday, June 15, 2024

DOS attack on Mac OS – Push fake alarms to Scare Users

One of the essential vectors for the delivery of technical support scams is malvertising. You’ll basically be browsing the web page then unexpectedly your program demonstrates a terrifying page guaranteeing your PC is infected.

Recently, there has been a pattern for scammers to cause denial-of-service attacks against user’s computers.

A lot of fake PC technical support campaigns finds their victims through cool calling. Be that as it may, these tricks are advancing to end up distinctly more like watering-opening methods, by demonstrating Malicious promotions for the assumed technical support.

Today security specialists at Malware bytes group found yet another procedure that targets Mac OS clients running Safari.

A recently registered scam site focusing on Mac clients was making the rounds toward the end of last year.

Basically going to the malicious site on an older version of MacOS would begin making a sequence of email drafts, which in the long run cause the machine to come up short on memory and stop.

DOS attack on Mac OS - Push fake alarms to Scare Users

The malicious website page will first decide the version of OS X with a client user agent check and push two distinct forms of DOS attack.

if ((navigator.userAgent.match(/OS 10.1.1/i))) {
else if ((navigator.userAgent.match(/OS 10.2/i))) {

The first variation has code that will continue drafting messages (yet does not really send them) incrementally and cover the past open windows.

DOS attack on Mac OS - Push fake alarms to Scare Users

The second variant(11.php) will rather open iTunes:

DOS attack on Mac OS - Push fake alarms to Scare Users


These defects may have been settled with MacOS Sierra 10.12.2 as Mac clients running a fully up-to-date OS don’t seem to be influenced by the Mail application DoS.

Be that as it may, the second variation seems to now be capable of opening up iTunes, without any alert in Safari:

Try not to fall for these sorts of scams, More essentially, please caution your family and companions about them.Update your OS, focusing on the security updates.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles