![]() That includes a cryptocurrency wallet drainer, a user control panel, the ability for customers to generate new builds themselves, and more. Unfortunately, it seems like the threat actor developing MacStealer has some more ideas that they are planning to incorporate into future versions. According to the developer, the low price is due to the malware lacking a user panel and any builder functionality, as well as its current beta status. Right now, the malware’s developers are selling it for $100 per build, making it relatively affordable in the world of malware as a service. Once that’s done, the stolen data is broadcasted to interested parties on a dedicated Telegram channel. Opening this launches a fake password prompt that harvests your login credentials and uses them to access your sensitive information, which is then zipped up and sent to a server controlled by the hacker. MacStealer begins its attacks using an installer file called weed.dmg. A fake password prompt created by the MacStealer macOS malware. That means there’s a lot that could be at risk if it gains a foothold on your Mac. It hoovers up a wide array of your personal data, including the iCloud Keychain password database, credit card data, cryptocurrency wallet credentials, browser cookies, documents, and more. The malware, dubbed MacStealer, was discovered by Uptycs, a threat research firm. It’s a reminder to be careful when opening apps from unknown sources. Fitbit Versa 3ĭespite their reputation for security, Macs can still get viruses, and that’s just been proven by a malicious new Mac malware that can steal your credit card info and send it back to the attacker, ready to be exploited. ![]()
0 Comments
Leave a Reply. |