Microsoft on Wednesday shed light on a previously undocumented Mac trojan that it said has undergone several iterations since its first appearance in September 2020, effectively granting it an "increasing progression of sophisticated capabilities."
The company's Microsoft 365 Defender Threat Intelligence Team dubbed the new malware family "UpdateAgent," charting its evolution from a barebones information stealer to a second-stage payload distributor as part of multiple attack waves observed in 2021.
"The latest campaign saw the malware installing the evasive and persistent Adload adware, but UpdateAgent's ability to gain access to a device can theoretically be further leveraged to fetch other, potentially more dangerous payloads," the researchers said.
The actively in-development malware is said to be propagated via drive-by downloads or advertisement pop-ups that masquerade as legitimate software like video applications and support agents, even as the authors have made steady improvements that have transformed UpdateAgent into a progressively persistent piece of malware.
Chief among the advancements include the capability to abuse existing user permissions to surreptitiously perform malicious activities and circumvent macOS Gatekeeper controls, a security feature that ensures only trusted applications from identified developers can be installed on a system.
In addition, UpdateAgent has been found to take advantage of public cloud infrastructure, namely Amazon S3 and CloudFront services, to host its second-stage payloads, including adware, in the form of .DMG or .ZIP files.
Once installed, the Adload malware makes use of ad injection software and man-in-the-middle (MitM) techniques to intercept and reroute users' internet traffic through the attacker's servers to insert rogue ads into web pages and search engine results to increase the chances of multiple infections on the devices.
"UpdateAgent is uniquely characterized by its gradual upgrading of persistence techniques, a key feature that indicates this trojan will likely continue to use more sophisticated techniques in future campaigns," the researchers cautioned.
Read more
- Hack Tool Apk No Root
- Pentest Tools Kali Linux
- Hack Tool Apk No Root
- Usb Pentest Tools
- Pentest Recon Tools
- Hacking Tools Free Download
- Hacker Tools Apk
- Hacking Tools For Kali Linux
- Blackhat Hacker Tools
- How To Make Hacking Tools
- Termux Hacking Tools 2019
- Hack Tools Pc
- Hacker Tools Software
- Pentest Tools For Windows
- Hacking Tools For Pc
- Hacker Tools List
- Growth Hacker Tools
- Hacker Tools For Mac
- Hacker Tools Online
- What Are Hacking Tools
- Hacking Tools And Software
- Hacking Apps
- Pentest Tools Windows
- Tools For Hacker
- Hacking Tools For Beginners
- Hacking Tools Free Download
- Pentest Tools Android
- Wifi Hacker Tools For Windows
- Pentest Tools For Mac
- Nsa Hack Tools
- Hacking Tools For Kali Linux
- New Hack Tools
- Hackrf Tools
- Pentest Recon Tools
- Hack And Tools
- Pentest Tools
- Hacking Tools Free Download
- Hack Rom Tools
- Pentest Tools Nmap
- Usb Pentest Tools
- Wifi Hacker Tools For Windows
- Hacking Tools Name
- Hacking Tools Windows
- Pentest Tools Apk
- Pentest Tools Linux
- Hacking Tools For Pc
- Tools 4 Hack
- Pentest Tools Port Scanner
- Hacker Tools Apk Download
- Hacking Apps
- Hacking Tools For Kali Linux
- Hacker Tools List
- Hack Tools
- Pentest Tools Website Vulnerability
- Pentest Tools List
- How To Make Hacking Tools
- Hacker Search Tools
- Best Pentesting Tools 2018
- Hacking Tools For Windows Free Download
- How To Hack
- Game Hacking
- Black Hat Hacker Tools
- Hacking Tools And Software
- Game Hacking
- Pentest Automation Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Usb
- Pentest Tools Free
- Pentest Tools Open Source
- Pentest Tools Website
- Beginner Hacker Tools
- Hacking Tools Online
- Pentest Box Tools Download
- Hacker Tools For Windows
- Hackrf Tools
- Hack Tools Pc
- Pentest Tools Nmap
- What Is Hacking Tools
- New Hacker Tools
- Pentest Tools Website Vulnerability
- Pentest Tools Open Source
- Hacks And Tools
- Hacker Tools For Mac
- Hacking Tools Mac
- Bluetooth Hacking Tools Kali
- Best Hacking Tools 2020
- Pentest Tools Framework
- Hack Tools Online
- Kik Hack Tools
- Hacking Tools For Kali Linux
- Hacker
- Hacker Tools For Mac
- Pentest Tools Find Subdomains
- Best Pentesting Tools 2018
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Apk
- Hacking Tools For Windows 7
- Hack Tools For Pc
- Hack Tools For Windows
- Kik Hack Tools
- Hack And Tools
- Computer Hacker
- Hacking Tools Usb
- Hacker Tool Kit
- Hack App
- Pentest Tools Review
- Bluetooth Hacking Tools Kali
- Pentest Tools Find Subdomains
- Black Hat Hacker Tools
- Hackers Toolbox
- Hacker Tools Hardware
- Hacking Tools For Windows
- Pentest Tools Windows
- Hack Tools For Windows
- Hacker Hardware Tools
- Hack Tools Pc
- Pentest Reporting Tools
- Hacker Tools For Mac
- Top Pentest Tools
- Tools For Hacker
- Hacking Tools For Windows Free Download
- Pentest Tools For Mac
- Nsa Hacker Tools
- Hacking Tools Pc
- Hacking App
- Pentest Tools Online
- Pentest Tools Open Source
- Ethical Hacker Tools
- Hacker Tools For Ios
- Hacking Tools For Games
- Pentest Tools Nmap
- Hacking Tools For Mac
- New Hacker Tools
- Hacks And Tools
- Hack Tools
- Tools Used For Hacking
- Hacker Tools For Mac
- Hacker Security Tools
- Hacking Tools For Games
- Hack Tools Pc
- Hack Tools For Games
- Game Hacking
- Hacking Tools Usb
- Hack Tools Github
- Hack Tools Online
- Hacking Tools Free Download
- Pentest Tools Online
- Hacker Tools Hardware
- Best Hacking Tools 2019
- Hack Tools Github
- Pentest Tools Linux
- Pentest Recon Tools
No comments:
Post a Comment