Blog

Latest Malware Is Targeting Macs And Is Hard To Detect

Jan 23, 2021 | Blog

There was a time when Apple was a niche player in the technology market.

As such, one thing Apple users could count on was the fact that they didn’t have to worry much about viruses or malware.

Hackers didn’t bother targeting them because there was so much low hanging fruit in the Windows market.

Times have changed, and Apple is now one of the dominant forces in tech. Given that change, the company’s products are now regularly targeted by hackers around the world. The most recently discovered variant of a MacOS-specific malware dubbed OSAMiner is an excellent example of that.

OSAMiner has been seen in the wilds and in use by hackers since at least 2015, but the group that controls the code has taken pains to keep the malware relevant by making regular updates. Its most recent update has made it a nasty piece of work indeed.

OASMiner’s latest capabilities have seen it begin to export payloads as run-only AppleScript files, which makes decompiling them a daunting proposition. That makes the job of security professionals attempting to analyze the code in order to better understand it, an extremely challenging proposition.

Typically, OSAMiner is spread embedded in pirated copies of games and productivity software, so unless you make regular use of those, you’re unlikely to see this strain. If you do, however, be advised that it will quietly install itself on your system and begin hogging an ever-increasing share of resources. It does this as it sets about the task of mining for cryptocurrency, using your system to put money in the pockets of the hackers.

As malware goes, that’s certainly not the worst thing in the world. Your system will be sluggish and increasingly unresponsive if you find yourself infected with the code, but your files and the integrity of your network won’t be at risk. Of course, the hackers controlling the software could decide to shift gears at any time, so there’s no guarantee that will hold.

In any case, it’s something you should be aware of. Again, know that it is proving to be extremely hard to analyze properly thanks to some clever coding tricks employed by those who designed it.

FBI Program Tasked with Infrastructure Security Compromised

FBI Program Tasked with Infrastructure Security Compromised

The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program's data on the dark web. The breach was initially disclosed by Brian Krebs of Krebs on Security, who claims that the data was for...

Streamline Your Business with the Latest Smart Home Technology

Streamline Your Business with the Latest Smart Home Technology

Are you a business owner looking to get the most out of your Google smart home devices? If so, you're in luck! Google has enabled its Nest products and Android OS with the initial rollout of the Matter smart home standard. This means that businesses now have the...

Data Breach at Sequoia One Exposes Sensitive Customer Information

Data Breach at Sequoia One Exposes Sensitive Customer Information

What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they were informed that the company had been hacked. Sequoia One specializes in the management of...

Cisco Reports Critical IP Phone Vulnerability

Cisco Reports Critical IP Phone Vulnerability

As a business owner, it's important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability, tracked as CVE-2022-20968, affecting its IP Phone 7800 and 8800 Series. This new vulnerability...

Google Chrome Releases Two New Features

Google Chrome Releases Two New Features

Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer's memory. This can be a problem if you're running other resource-intensive tasks and don't want to slow...

Get a Free Consultation

 

Fill out the form below to receive a free consultation and learn how we can make your technology worry-free!

 

Contact Information

  • 39301 Badger Street, Suite 500
    Palm Desert, CA 9221
  • (760) 333-8523
  • info@icn.tech