Microsoft on Wednesday shed light on a previously undocumented Mac trojan that it said has undergone several iterations since its first appearance in September 2020, effectively granting it an "increasing progression of sophisticated capabilities."
The company's Microsoft 365 Defender Threat Intelligence Team dubbed the new malware family "UpdateAgent," charting its evolution from a barebones information stealer to a second-stage payload distributor as part of multiple attack waves observed in 2021.
"The latest campaign saw the malware installing the evasive and persistent Adload adware, but UpdateAgent's ability to gain access to a device can theoretically be further leveraged to fetch other, potentially more dangerous payloads," the researchers said.
The actively in-development malware is said to be propagated via drive-by downloads or advertisement pop-ups that masquerade as legitimate software like video applications and support agents, even as the authors have made steady improvements that have transformed UpdateAgent into a progressively persistent piece of malware.
Chief among the advancements include the capability to abuse existing user permissions to surreptitiously perform malicious activities and circumvent macOS Gatekeeper controls, a security feature that ensures only trusted applications from identified developers can be installed on a system.
In addition, UpdateAgent has been found to take advantage of public cloud infrastructure, namely Amazon S3 and CloudFront services, to host its second-stage payloads, including adware, in the form of .DMG or .ZIP files.
Once installed, the Adload malware makes use of ad injection software and man-in-the-middle (MitM) techniques to intercept and reroute users' internet traffic through the attacker's servers to insert rogue ads into web pages and search engine results to increase the chances of multiple infections on the devices.
"UpdateAgent is uniquely characterized by its gradual upgrading of persistence techniques, a key feature that indicates this trojan will likely continue to use more sophisticated techniques in future campaigns," the researchers cautioned.
Related word- Hacker Tools Free Download
- Hacking Tools For Windows
- Hacker Tools Free Download
- New Hack Tools
- Pentest Automation Tools
- Hacker
- World No 1 Hacker Software
- Hacker Tools For Windows
- Hack Tools Online
- Pentest Tools Subdomain
- Hacking App
- Hacking Tools Kit
- Pentest Tools Website
- Hackrf Tools
- Hacker Tools Mac
- Hacking App
- Hacking Tools Software
- Nsa Hacker Tools
- Nsa Hack Tools
- Hacker Tools For Windows
- Hacker Tool Kit
- Hacking App
- Hacking Tools For Windows 7
- Hack Tools
- Computer Hacker
- What Is Hacking Tools
- Wifi Hacker Tools For Windows
- Best Hacking Tools 2019
- Hacking Tools
- Hacker Tools For Mac
- Hacking App
- Hacking Tools For Mac
- Hacking Apps
- Game Hacking
- Hack Tools Pc
- Pentest Tools Nmap
- Pentest Tools Url Fuzzer
- Hacking Tools For Mac
- Hacking Tools For Windows
- Nsa Hack Tools
- Pentest Tools Tcp Port Scanner
- Hack Tools
- Hacker Tools
- Hacker Tools Online
- Hacker Tools For Windows
- What Is Hacking Tools
- Kik Hack Tools
- Hacker Tools
- Pentest Box Tools Download
- Pentest Tools Website Vulnerability
- Pentest Tools Nmap
- Hacking Tools Windows 10
- Beginner Hacker Tools
- Pentest Tools Linux
- Pentest Tools For Ubuntu
- Android Hack Tools Github
- Hacking Tools For Beginners
- Hacker Tools 2019
- Hacker Tools For Mac
- Pentest Reporting Tools
- Hacking Tools Software
- Hack Tools
- Computer Hacker
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Online
- Pentest Tools Kali Linux
- Hacking Tools Name
- Hacker Tools For Windows
- Hacker Tools Software
- Pentest Tools For Ubuntu
- New Hack Tools
- Hacker Tools Software
- Pentest Tools Url Fuzzer
- Hacker Tools Free
- Hacker Tools 2019
- Hacking Tools For Pc
- Ethical Hacker Tools
- Hacking Tools And Software
- Pentest Tools For Windows
- Pentest Tools Free
- Pentest Tools Linux
- Bluetooth Hacking Tools Kali
No comments:
Post a Comment