“Activator” Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets

January 23, 2024 at 08:24AM

Apple macOS users have been targeted by cracked software delivering a new stealer malware, capable of stealing cryptocurrency wallet data. The attack involves booby-trapped disk image files, prompting users to enter the system administrator password and execute a modified executable. The malware establishes contact with a command-and-control server to fetch an encrypted script, ultimately replacing crypto wallet applications with infected versions. This represents a growing trend of cracked software being used to distribute malware on macOS.

From the meeting notes, it is clear that there is a significant threat to macOS users from cracked software infecting their systems with a new stealer malware, capable of harvesting system information and cryptocurrency wallet data. The attack involves leveraging booby-trapped disk image files and using a pirated version of legitimate software to prompt the victim to enter the system administrator password, allowing the malware to execute with elevated permissions.

Furthermore, the malware establishes contact with a command-and-control server to fetch an encrypted script and is designed to run received commands, gather system metadata, and check for the presence of specific cryptocurrency wallets on infected hosts. If found, the malware replaces the applications with trojanized versions, aiming to exfiltrate sensitive wallet information to an actor-controlled server.

It is noted that the threat actor actively maintains and updates the backdoor, posing a continued danger to infected systems.

It is worth noting that this article also highlights the increasing use of cracked software as a conduit for compromising macOS users with various malware, underlining the importance of awareness and cybersecurity measures.

For more information and exclusive content, the team can follow the sources mentioned in the article on Twitter and LinkedIn.

Let me know if we should take any specific action based on this information.

Full Article