article thumbnail

Convuster: macOS adware now in Rust

SecureList

Traditionally, most malicious objects detected on the macOS platform are adware: besides the already familiar Shlayer family , the TOP 10 includes Bnodlero, Cimpli, Adload and Pirrit adware. The analysis showed these executables to be a new adware program, that has subsequently been called Convuster. Introduction. Distribution.

Adware 126
article thumbnail

Good old malware for the new Apple Silicon platform

SecureList

Encrypting user files. This payload uses JavaScript API to run bash commands in order to download a JSON configuration file. Downloading of JSON config. And after successfully downloading that configuration file, the sample extracts a URL from the downloadURL field for the next download. Frequently Asked Questions.

Adware 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile malware evolution 2020

SecureList

The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers. Number of attacks on mobile users in 2019 and 2020 ( download ). Last year was notable for both malware and adware, the two very close in terms of capabilities.

Mobile 133
article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

To set such a stratagem in motion, cybercriminals poison legitimate websites with ads that lead to shady URLs or download malicious code camouflaged as something harmless. If a user gets on the hook, they are redirected to a landing page or prompted to download an ostensibly innocuous file.

article thumbnail

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

Although the campaign has not reached the magnitude of the Zacinlo adware campaign, it is already infecting users worldwide.” When executed, a rootkit driver is installed to hide the malware and ensure persistence, then it connects the C2 to download and install additional components.

Spyware 78
article thumbnail

State of Malware 2024: What consumers need to know

Malwarebytes

We have seen news of ChatGPT leaking user’s information and law enforcement asking for backdoors in encryption routines. Passwords Google and Microsoft made good on their promise to back passkeys , an encryption-based alternative to passwords that can’t be stolen, guessed, cracked, or phished. This is changing.

Malware 76
article thumbnail

Android malware, Android malware and more Android malware

SecureList

million malware, adware, and riskware attacks on mobile devices. Encrypted C2 address in a chat invitation Tambir supports more then 30 commands that it can retrieve from the C2. Commands that can be received are related to installing, downloading and deleting apps on the device, downloading files, and showing popups, among others.

Malware 86