BTC $62969.9872
ETH $3144.1985
BNB $586.6839
SOL $137.3976
stETH $3141.5323
XRP $0.5154
DOGE $0.1455
TON $5.2781
ADA $0.4566
AVAX $34.0280
wstETH $3661.2987
TRX $0.1203
WETH $3146.6239
WBTC $62879.9098
DOT $6.6366
BCH $474.1558
LINK $13.9415
MATIC $0.6984
UNI $7.7009
LTC $84.6505
ICP $12.9194
DAI $1.0001
CAKE $2.6933
NEAR $7.0413
RNDR $7.9026
IMX $2.0893
FDUSD $1.0011
ETC $26.7639
HBAR $0.1047
STX $2.5206
MNT $1.0667
OKB $52.3321
FIL $5.7651
PEPE $0.0000
VET $0.0386
TAO $415.1710
WIF $2.7304
ATOM $8.2507
MKR $2917.4892
KAS $0.1112
GRT $0.2573
USDE $0.9990
FET $2.1143
INJ $25.3232
XLM $0.1126
THETA $2.2287
XMR $120.5174
BTC $62969.9872
ETH $3144.1985
BNB $586.6839
SOL $137.3976
stETH $3141.5323
XRP $0.5154
DOGE $0.1455
TON $5.2781
ADA $0.4566
AVAX $34.0280
wstETH $3661.2987
TRX $0.1203
WETH $3146.6239
WBTC $62879.9098
DOT $6.6366
BCH $474.1558
LINK $13.9415
MATIC $0.6984
UNI $7.7009
LTC $84.6505
ICP $12.9194
DAI $1.0001
CAKE $2.6933
NEAR $7.0413
RNDR $7.9026
IMX $2.0893
FDUSD $1.0011
ETC $26.7639
HBAR $0.1047
STX $2.5206
MNT $1.0667
OKB $52.3321
FIL $5.7651
PEPE $0.0000
VET $0.0386
TAO $415.1710
WIF $2.7304
ATOM $8.2507
MKR $2917.4892
KAS $0.1112
GRT $0.2573
USDE $0.9990
FET $2.1143
INJ $25.3232
XLM $0.1126
THETA $2.2287
XMR $120.5174
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Hackers use popular macOS programs to mine cryptocurrency

    Popular in the professional environment, multimedia software is used by hackers to deploy hidden malware for cryptocurrency mining on macOS systems.

    The malicious campaign was discovered by Jamf Threat Labs. According to experts, the XMRig crypto miner was launched using an unauthorized modification of Final Cut Pro, Apple's video editing software.

    “This malware uses the Invisible Internet Project (I2P) to download malicious components and send the mined currency to the attacker’s crypto wallet,” Jamf Threat Labs researchers said in their report published.

    An earlier iteration of this malicious campaign was documented exactly one year ago by Trend Micro, which pointed to the use of I2P malware to hide network traffic. At that time, Trend Micro experts suggested that the malware could have been delivered as a DMG file for Adobe Photoshop CC 2019.

    Malicious versions of Final Cut Pro and Logic Pro X have reportedly been hosted on the popular pirate content service The Pirate Bay. Other professional programs posted back in 2019 were also found there. All this time, the malware has been refined and made more secretive for anti-virus systems.

    The ability of malware to remain undetected on a victim's computer, combined with the fact that users are already generally ready for antivirus solutions to respond to the built-in "crack", make the malware vector very effective.

    Apple, however, has taken some steps to combat the spread of such software. Notarized apps are now subject to more stringent checks in macOS Ventura, making it harder for fake apps to run.

    “On the other hand, macOS Ventura did not prevent the launch of the cryptominer itself,” noted Jamf Threat Labs researchers. "By the time the user receives the error message, the malware will already be installed on the system."

    In general, Apple definitely still has work to do in terms of security, and users should be more careful about the source of software downloads. Especially if they don't want to pay for it.

    Author DeepWeb
    TeamTNT distributes a miner that is not detected by security tools
    General Bytes Bitcoin ATMs Hacked: $1.5 Million Stolen

    Comments 0

    Add comment