Tuesday, April 22, 2025
HomeMalwareDOS attack on Mac OS - Push fake alarms to Scare Users

DOS attack on Mac OS – Push fake alarms to Scare Users

Published on

SIEM as a Service

Follow Us on Google News

One of the essential vectors for the delivery of technical support scams is malvertising. You’ll basically be browsing the web page then unexpectedly your program demonstrates a terrifying page guaranteeing your PC is infected.

Recently, there has been a pattern for scammers to cause denial-of-service attacks against user’s computers.

A lot of fake PC technical support campaigns finds their victims through cool calling. Be that as it may, these tricks are advancing to end up distinctly more like watering-opening methods, by demonstrating Malicious promotions for the assumed technical support.

- Advertisement - Google News

Today security specialists at Malware bytes group found yet another procedure that targets Mac OS clients running Safari.

A recently registered scam site focusing on Mac clients was making the rounds toward the end of last year.

Basically going to the malicious site on an older version of MacOS would begin making a sequence of email drafts, which in the long run cause the machine to come up short on memory and stop.

DOS attack on Mac OS - Push fake alarms to Scare Users

The malicious website page will first decide the version of OS X with a client user agent check and push two distinct forms of DOS attack.

if ((navigator.userAgent.match(/OS 10.1.1/i))) {
 location.replace("");
}
else if ((navigator.userAgent.match(/OS 10.2/i))) {
 location.replace("");
}else
{
location.replace("");}

The first variation has code that will continue drafting messages (yet does not really send them) incrementally and cover the past open windows.

DOS attack on Mac OS - Push fake alarms to Scare Users

The second variant(11.php) will rather open iTunes:

DOS attack on Mac OS - Push fake alarms to Scare Users

Defences:

These defects may have been settled with MacOS Sierra 10.12.2 as Mac clients running a fully up-to-date OS don’t seem to be influenced by the Mail application DoS.

Be that as it may, the second variation seems to now be capable of opening up iTunes, without any alert in Safari:

Try not to fall for these sorts of scams, More essentially, please caution your family and companions about them.Update your OS, focusing on the security updates.

Latest articles

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

A notorious threat actor has allegedly begun selling “Baldwin Killer,” a sophisticated malware toolkit...

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions

A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field...