Apple released updates to macOS Big Sur, Monterey, and Ventura on Monday, but based on security notes, those updates don’t appear to include patches for MacStealer.ĭespite posing a considerable risk, MacStealer is easily detectable by Gatekeeper, which will block it on most Macs, running macOS Catalina or later, with M-series chips from Intel or Apple, that are targeted by this virus. It is not clear if MacStealer was registered in the CVE.report database that tracks vulnerabilities and exposures, and Apple has not commented on the malware. The researchers have explained that the malware collects the data, compresses it into a single zip file, sends the file, and then deletes it from the Mac. Unlike other macOS malware, it is not yet known how the “weed.dmg” file is distributed, but opening this DMG file is enough to infect a Mac. The maker of this malware promotes its abilities and makes it available to criminals for $100 per build. Uptycs discovered the existence of the MacStealer through his search on the “dark web”. MacStealer seeks to get hold of financial data ![]() zip, and can extract the Mac password manager database, Ke圜hain. The report specifies that it can extract several different file types, including. The MacStealer has been designed to extract iCloud passwordsespecially those related to our financial data, such as passwords, cookies and credit card data from Firefox, Google Chrome and Microsoft Brave browsers. ![]() According to a report shared by security researchers from uptycs,** A new piece of malware targeting Macs has been identified, called MacStealer.** As much as Apple boasts about the security of its operating systemsWith good reason, it is inevitable that from time to time cybercriminals insist on taking advantage of a vulnerability to attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |