BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Hackers use popular macOS programs to mine cryptocurrency

    Popular in the professional environment, multimedia software is used by hackers to deploy hidden malware for cryptocurrency mining on macOS systems.

    The malicious campaign was discovered by Jamf Threat Labs. According to experts, the XMRig crypto miner was launched using an unauthorized modification of Final Cut Pro, Apple's video editing software.

    “This malware uses the Invisible Internet Project (I2P) to download malicious components and send the mined currency to the attacker’s crypto wallet,” Jamf Threat Labs researchers said in their report published.

    An earlier iteration of this malicious campaign was documented exactly one year ago by Trend Micro, which pointed to the use of I2P malware to hide network traffic. At that time, Trend Micro experts suggested that the malware could have been delivered as a DMG file for Adobe Photoshop CC 2019.

    Malicious versions of Final Cut Pro and Logic Pro X have reportedly been hosted on the popular pirate content service The Pirate Bay. Other professional programs posted back in 2019 were also found there. All this time, the malware has been refined and made more secretive for anti-virus systems.

    The ability of malware to remain undetected on a victim's computer, combined with the fact that users are already generally ready for antivirus solutions to respond to the built-in "crack", make the malware vector very effective.

    Apple, however, has taken some steps to combat the spread of such software. Notarized apps are now subject to more stringent checks in macOS Ventura, making it harder for fake apps to run.

    “On the other hand, macOS Ventura did not prevent the launch of the cryptominer itself,” noted Jamf Threat Labs researchers. "By the time the user receives the error message, the malware will already be installed on the system."

    In general, Apple definitely still has work to do in terms of security, and users should be more careful about the source of software downloads. Especially if they don't want to pay for it.

    Author DeepWeb
    TeamTNT distributes a miner that is not detected by security tools
    General Bytes Bitcoin ATMs Hacked: $1.5 Million Stolen

    Comments 0

    Add comment