A new macOS malware disguised as a copy of Discord app takes screenshots
repeatedly and sends to attackers command-and-control (C&C) server. The Legitimate Discord that used by gamers to communicate with each other.
Malwarebytes researcher Adam Thomas found the malicious copy of the app, the malicious app pretends to be a legit Discord app, it includes Python code and base64-encoded Python snippets.
To take the screenshot at regular intervals the payload will launch an agent which keeps the agent as well as the backdoor EmPyre code running.
The malware appears to be in the development stageand it dosen’t include any functionality of the legitimate, the malicious app contains only an automated script.
The malware author uses the generic Automator icon that shows in the menu bar when any automated script is running. Before the user notice notices something is going wrong the malware sends screenshot to the attackers servers.
Another Mac malware was identified by Lambert and analyzed by Wardle, the malicious document which uses sandox escape to launch agent and a python script to maintain persistence.
The attack relies on the malicious Word document and the user need to allows macros to run, if macros disabled then you are safe.
DarthMiner and LamePyre had similarities in the way they are distributed, both use Python scripts and EmPyre backdoor. Researchers beleive both the malware created by the same developer.
Recently CoinTicker app suffered a supply chain attack, the app pushes 2 different backdoors on Mac users to steal the cryptocurrency coins and other malicious activities.
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…
CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…
A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…