Microsoft on Wednesday shed light on a previously undocumented Mac trojan that it said has undergone several iterations since its first appearance in September 2020, effectively granting it an "increasing progression of sophisticated capabilities."
The company's Microsoft 365 Defender Threat Intelligence Team dubbed the new malware family "UpdateAgent," charting its evolution from a barebones information stealer to a second-stage payload distributor as part of multiple attack waves observed in 2021.
"The latest campaign saw the malware installing the evasive and persistent Adload adware, but UpdateAgent's ability to gain access to a device can theoretically be further leveraged to fetch other, potentially more dangerous payloads," the researchers said.
The actively in-development malware is said to be propagated via drive-by downloads or advertisement pop-ups that masquerade as legitimate software like video applications and support agents, even as the authors have made steady improvements that have transformed UpdateAgent into a progressively persistent piece of malware.
Chief among the advancements include the capability to abuse existing user permissions to surreptitiously perform malicious activities and circumvent macOS Gatekeeper controls, a security feature that ensures only trusted applications from identified developers can be installed on a system.
In addition, UpdateAgent has been found to take advantage of public cloud infrastructure, namely Amazon S3 and CloudFront services, to host its second-stage payloads, including adware, in the form of .DMG or .ZIP files.
Once installed, the Adload malware makes use of ad injection software and man-in-the-middle (MitM) techniques to intercept and reroute users' internet traffic through the attacker's servers to insert rogue ads into web pages and search engine results to increase the chances of multiple infections on the devices.
"UpdateAgent is uniquely characterized by its gradual upgrading of persistence techniques, a key feature that indicates this trojan will likely continue to use more sophisticated techniques in future campaigns," the researchers cautioned.
Related links
- Pentest Tools List
- Growth Hacker Tools
- Hacking Tools Windows
- Hacker
- Underground Hacker Sites
- Github Hacking Tools
- Hacking Tools For Mac
- Pentest Automation Tools
- Physical Pentest Tools
- How To Hack
- New Hacker Tools
- Hacker Tools Github
- Black Hat Hacker Tools
- Hacking Tools For Mac
- Hacking Tools For Kali Linux
- Hacker Tools Free
- How To Hack
- Hacker Tools
- Top Pentest Tools
- Hack And Tools
- Hacking Tools Windows 10
- Hacker Tools Windows
- What Are Hacking Tools
- Pentest Tools Alternative
- Hacker Tools Online
- Pentest Tools Linux
- Pentest Tools Online
- Pentest Reporting Tools
- Hacking Tools Software
- Hacker Tools Mac
- Hack Tools For Windows
- Best Pentesting Tools 2018
- Pentest Tools Tcp Port Scanner
- Hacking Tools Windows 10
- How To Install Pentest Tools In Ubuntu
- Hacker Security Tools
- Hacker Tools Github
- Hacking Tools Windows
- Hacker Tools For Mac
- Hacking Tools Online
- Hacking Tools Online
- Hacker Tools Free
- Physical Pentest Tools
- Hacker Tools For Mac
- Hacking Tools Download
- Hack Tools
- Hack Tools Mac
- Black Hat Hacker Tools
- Hack Tools Pc
- Kik Hack Tools
- How To Hack
- Pentest Tools Website
- World No 1 Hacker Software
- How To Install Pentest Tools In Ubuntu
- Free Pentest Tools For Windows
- Hacking Tools Windows
- Pentest Tools
- Tools 4 Hack
- Hack Apps
- Hack Website Online Tool
- Pentest Tools For Ubuntu
- Nsa Hacker Tools
- Pentest Tools Github
- Pentest Tools Open Source
- Hack Tool Apk No Root
- Best Hacking Tools 2019
- How To Hack
- Hack Rom Tools
- Hacker Tools Hardware
- Top Pentest Tools
- Pentest Tools Android
- What Are Hacking Tools
- Hacking Tools Github
- Underground Hacker Sites
- Hacking Tools Windows
- Hacker Security Tools
- Top Pentest Tools
- Pentest Tools Github
- Hacker Tools Software
- Hack Tools For Mac
- Android Hack Tools Github
- New Hacker Tools
- Pentest Tools Linux
- Hacker Tools Mac
- Pentest Recon Tools
- Kik Hack Tools
- Hacking App
- World No 1 Hacker Software
- Pentest Tools Framework
- Hacking Tools Pc
- Hack Tools Download
- Hacker Hardware Tools
- Hacker Tools Linux
- Hacker Tools
- Hack Rom Tools
- Pentest Tools Tcp Port Scanner
- Hacker Tools For Windows
- Ethical Hacker Tools
- Pentest Tools Linux
- Nsa Hack Tools
- Hacker Tools For Pc
- Easy Hack Tools
- Pentest Automation Tools
- Hack Rom Tools
- Hacking Tools Hardware
- Hacker Tools Online
- Computer Hacker
- How To Make Hacking Tools
- Hack Tool Apk No Root
- Pentest Tools
- Hacking Tools Windows 10
- Pentest Tools For Ubuntu
- Hack Tools Mac
- Hacking App
- Android Hack Tools Github
- Hack Website Online Tool
- Pentest Tools Website
- Hacker Tools For Ios
- Hack Tools For Windows
- Hacking Tools For Windows
- Pentest Tools Tcp Port Scanner
- Github Hacking Tools
- Hacking Tools Usb
- Hacker Tools Linux
- New Hack Tools
- Hacker Tools For Ios
- What Is Hacking Tools
- New Hacker Tools
No hay comentarios:
Publicar un comentario