Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading malware disguised as event attachments.
By leveraging trust in calendar invitations, threat actors increase the likelihood of successful phishing attacks and unauthorized access to sensitive information.
Cybersecurity researchers at Malwarebytes recently discovered that hackers are actively exploiting the weaponized calendar invites to install macOS malware.
Mac users seeking cryptocurrency opportunities are targeted by cybercriminals using fake calendar invites.
Malware analysis can be fast and simple. Just let us show you the way to:
Links sent during attacks install malware on the target’s machine.
Brian Krebs flagged the issue, and asserted that scammers pose as cryptocurrency investors, and lure people into fake partnership meetings on Telegram.
Signum Capital issued a warning about impersonation attempts on Twitter in January.
Threat actors contact the targets via Telegram DMs in which they lure their targets by offering opportunities for calls or meetings.
Interested targets receive fake meeting invitations.
When victims attempt to join, the link fails. Scammers blame regional access restrictions and advise running a script to fix it.
Malwarebytes’ Thomas Reed confirmed threat actors’ use of scripts to compromise users isn’t new.
AppleScripts come in .scpt files, but victims need to open in Script Editor and may spot the code.
AppleScript applets act like normal apps, enhancing trustworthiness with code signing and icons.
Due to this obfuscating the code is possible which makes it less likely for Apple’s notarization process to detect potential threats.
When a user enters their password, the script doesn’t see it but gains root access. Actions run with administrator privileges without additional authentication.
The script can easily trick users into granting root permissions through a standard authentication request dialog.
AppleScript excels at malware crafting. Certain malicious programs like OSX.DubRobber, OSX.OSAMiner utilized AppleScript solely or near-solely.
A basic Apple Script, in this case, downloaded and ran a macOS Trojan whose purpose is unknown.
If it’s revealed as a cryptocurrency-stealing banking Trojan, then it wouldn’t be surprising.
Here below we have mentioned all the key tactics used by the threat actors, and these tactics will help in recognizing the scam:-
You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…