miércoles, 24 de enero de 2024

New Variant Of UpdateAgent Malware Infects Mac Computers With Adware


 Microsoft on Wednesday shed light on a previously undocumented Mac trojan that it said has undergone several iterations since its first appearance in September 2020, effectively granting it an "increasing progression of sophisticated capabilities."

The company's Microsoft 365 Defender Threat Intelligence Team dubbed the new malware family "UpdateAgent," charting its evolution from a barebones information stealer to a second-stage payload distributor as part of multiple attack waves observed in 2021.

"The latest campaign saw the malware installing the evasive and persistent Adload adware, but UpdateAgent's ability to gain access to a device can theoretically be further leveraged to fetch other, potentially more dangerous payloads," the researchers said.

The actively in-development malware is said to be propagated via drive-by downloads or advertisement pop-ups that masquerade as legitimate software like video applications and support agents, even as the authors have made steady improvements that have transformed UpdateAgent into a progressively persistent piece of malware.


Chief among the advancements include the capability to abuse existing user permissions to surreptitiously perform malicious activities and circumvent macOS Gatekeeper controls, a security feature that ensures only trusted applications from identified developers can be installed on a system.

In addition, UpdateAgent has been found to take advantage of public cloud infrastructure, namely Amazon S3 and CloudFront services, to host its second-stage payloads, including adware, in the form of .DMG or .ZIP files.

Once installed, the Adload malware makes use of ad injection software and man-in-the-middle (MitM) techniques to intercept and reroute users' internet traffic through the attacker's servers to insert rogue ads into web pages and search engine results to increase the chances of multiple infections on the devices.

"UpdateAgent is uniquely characterized by its gradual upgrading of persistence techniques, a key feature that indicates this trojan will likely continue to use more sophisticated techniques in future campaigns," the researchers cautioned.

More articles


  1. Hack Tools Github
  2. Pentest Tools Subdomain
  3. Top Pentest Tools
  4. Hacker Tools For Ios
  5. Hacker Tools List
  6. Hack Tool Apk
  7. Wifi Hacker Tools For Windows
  8. Top Pentest Tools
  9. Pentest Tools Framework
  10. Pentest Tools Online
  11. Bluetooth Hacking Tools Kali
  12. Pentest Tools Free
  13. Free Pentest Tools For Windows
  14. Hacking Tools 2020
  15. Best Pentesting Tools 2018
  16. Pentest Tools Framework
  17. Tools For Hacker
  18. Pentest Automation Tools
  19. Hacking Tools And Software
  20. Hack Tools Download
  21. Hacker Tools For Mac
  22. Pentest Reporting Tools
  23. Hacker Tools Windows
  24. Hacker Tools For Mac
  25. Hacks And Tools
  26. Hacker Tools
  27. Hacker Tools Apk Download
  28. Hak5 Tools
  29. Tools For Hacker
  30. Hack App
  31. Wifi Hacker Tools For Windows
  32. Kik Hack Tools
  33. Hacking Tools 2019
  34. Black Hat Hacker Tools
  35. Pentest Tools
  36. Hak5 Tools
  37. Hacking Tools Windows 10
  38. New Hack Tools
  39. Hack Tools Github
  40. Hacking Tools Usb
  41. Hacker Techniques Tools And Incident Handling
  42. Hacker Tools For Mac
  43. Best Pentesting Tools 2018
  44. Hacking Tools For Windows 7
  45. Hackrf Tools
  46. Blackhat Hacker Tools
  47. Hack Rom Tools
  48. Hacking Tools Windows
  49. Hackers Toolbox
  50. Pentest Tools Kali Linux
  51. Hacker
  52. Hacking Tools For Games
  53. Hack Tool Apk No Root
  54. Tools Used For Hacking
  55. Hacker Techniques Tools And Incident Handling
  56. Best Pentesting Tools 2018
  57. Pentest Tools Github
  58. Physical Pentest Tools
  59. Blackhat Hacker Tools
  60. Pentest Tools Android
  61. Hack And Tools
  62. Nsa Hacker Tools
  63. Hack Tools Online
  64. Pentest Recon Tools
  65. Hacking Tools For Games
  66. Hacker Tools
  67. Hack Tools 2019
  68. Hack Rom Tools
  69. Pentest Tools Tcp Port Scanner
  70. Underground Hacker Sites
  71. How To Make Hacking Tools
  72. Hacker Tools List
  73. Hacking Tools Usb
  74. New Hack Tools
  75. Hack Tools For Games
  76. Hacking Tools And Software
  77. Hacks And Tools
  78. Hacker Tool Kit
  79. Growth Hacker Tools
  80. Pentest Tools Port Scanner
  81. Pentest Tools Android
  82. Tools For Hacker
  83. Pentest Automation Tools
  84. Kik Hack Tools
  85. Install Pentest Tools Ubuntu
  86. Hacking Tools And Software
  87. Top Pentest Tools
  88. Pentest Reporting Tools
  89. Hacker Tools Github
  90. Pentest Tools Android
  91. Hacker Tools For Mac
  92. Pentest Tools For Android
  93. Pentest Box Tools Download
  94. Best Hacking Tools 2020
  95. Hacker Techniques Tools And Incident Handling
  96. Hacking Tools Kit
  97. Hacker Tools Free Download
  98. Hacking Tools For Pc
  99. Physical Pentest Tools
  100. Pentest Tools Android
  101. Pentest Reporting Tools
  102. Hacker Tool Kit
  103. Hack Tools Download
  104. Hack Tools For Pc
  105. Hacking Apps
  106. Hacker
  107. Pentest Tools Online
  108. Hacker Tools Free
  109. What Are Hacking Tools
  110. Hacking Tools
  111. Hack Tools For Mac
  112. Hacker Tools For Windows
  113. Pentest Tools Nmap
  114. Pentest Tools For Mac
  115. Hacking Tools For Pc
  116. Top Pentest Tools
  117. Hacker Tools Github
  118. Hacker Hardware Tools
  119. Hacking Tools Windows
  120. Pentest Tools Apk

No hay comentarios:

Publicar un comentario