BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Hackers use popular macOS programs to mine cryptocurrency

    Popular in the professional environment, multimedia software is used by hackers to deploy hidden malware for cryptocurrency mining on macOS systems.

    The malicious campaign was discovered by Jamf Threat Labs. According to experts, the XMRig crypto miner was launched using an unauthorized modification of Final Cut Pro, Apple's video editing software.

    “This malware uses the Invisible Internet Project (I2P) to download malicious components and send the mined currency to the attacker’s crypto wallet,” Jamf Threat Labs researchers said in their report published.

    An earlier iteration of this malicious campaign was documented exactly one year ago by Trend Micro, which pointed to the use of I2P malware to hide network traffic. At that time, Trend Micro experts suggested that the malware could have been delivered as a DMG file for Adobe Photoshop CC 2019.

    Malicious versions of Final Cut Pro and Logic Pro X have reportedly been hosted on the popular pirate content service The Pirate Bay. Other professional programs posted back in 2019 were also found there. All this time, the malware has been refined and made more secretive for anti-virus systems.

    The ability of malware to remain undetected on a victim's computer, combined with the fact that users are already generally ready for antivirus solutions to respond to the built-in "crack", make the malware vector very effective.

    Apple, however, has taken some steps to combat the spread of such software. Notarized apps are now subject to more stringent checks in macOS Ventura, making it harder for fake apps to run.

    “On the other hand, macOS Ventura did not prevent the launch of the cryptominer itself,” noted Jamf Threat Labs researchers. "By the time the user receives the error message, the malware will already be installed on the system."

    In general, Apple definitely still has work to do in terms of security, and users should be more careful about the source of software downloads. Especially if they don't want to pay for it.

    Author DeepWeb
    TeamTNT distributes a miner that is not detected by security tools
    General Bytes Bitcoin ATMs Hacked: $1.5 Million Stolen

    Comments 0

    Add comment