article thumbnail

New Shlayer Mac malware spreads via poisoned search engine results

Security Affairs

“As of Friday, the new malware installer and its payload had a 0/60 detection rate among all antivirus engines on VirusTotal.” The bash shell script opens and runs itself in the Terminal app, then it extracts a self-embedded, password-protected.zip archive file, which contains a traditional Mac.app bundle. up to 10.14.3.

article thumbnail

Threat in your browser: what dangers innocent-looking extensions hold for users

SecureList

All of them were used to siphon off sensitive user data, such as cookies and passwords, and even take screenshots; in total, these malicious extensions were downloaded 32 million times. Since the beginning of 2020, Kaspersky products prevented 6,057,308 users from downloading malware , adware and riskware disguised as browser extensions.

Adware 99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

No “Apple magic” as 11% of macOS detections last year came from malware

Malwarebytes

Separately, in September 2023, Malwarebytes discovered a cybercriminal campaign that tricked Mac users into accidentally installing a type of malware that can steal passwords, browser data, cookies, files, and cryptocurrency. Replace “magic” with Malwarebytes Cyberthreats on Mac aren’t non-existent, they’re just different.

Malware 137
article thumbnail

Security Affairs newsletter Round 423 by Pierluigi Paganini – International edition

Security Affairs

Gox exchange and operating BTC-e Japanese Pharmaceutical giant Eisai hit by a ransomware attack Clop ransomware gang was testing MOVEit Transfer bug since 2021 Stealth Soldier backdoor used is targeted espionage attacks in Libya Researchers published PoC exploit code for actively exploited Windows elevation of privilege issue Experts detail a new Kimsuky (..)

article thumbnail

Apple Fixes Zero-Day Flaws in Unscheduled iOS Update – Here’s How to Patch

Hot for Security

fixes a critical memory corruption issue in the Safari WebKit engine where “processing maliciously crafted web content may lead to arbitrary code execution,” according to the advisory. Malicious actors who exploited the flaw could run unapproved software via compromised websites or poisoned search engine results.

VPN 144
article thumbnail

What is Digital Identity?

Identity IQ

The following vectors represent some of the most common ways a criminal could gain access to your accounts and is also known as an account takeover : Social Engineering. Weak or Limited Number of Passwords. There is a reason why using passwords such as “password1” or “1234” are inadvisable: they are very easy to guess.

article thumbnail

How to stay safe from cybercriminals and avoid data breaches 

IT Security Guru

Secure your accounts with complex passwords. Are your passwords so strong you struggle to remember them? If not, it might be time you shift to new password and cryptography strategies. . This method works because many people set ordinary and easy-to-remember passwords, often using the same one for multiple accounts.