Page 12 - AeM_September_2020
P. 12

RESEARCH
  ANALYSIS
              6.  OSX.Loudminer  is  a  2.5  GB  malware  that  is  usually  spread  by   9.  OSX-Mokes  and  OSX.Netwire  /
  TRENDS
                downloading  "cracked"  audio  software  and  aims  to  take  over  a   Wirenet  are  malware  variants
                user's computer to create cryptocurrencies. The hackers specifically   that imitate legitimate applications
                focus  on  virtual  studio  software  and  other  processor-intensive   and   use   names   such   as
                applications to mask their cryptomining activities.                 'Dropbox',  'Chrome'  and  'Firefox'
                                                                                    to  avoid  detection.  Particularly  at
              7.  KeyStealDaemon is malware that benefits from a security loophole   risk  are  MacOS  users  running
                that  can  access  sensitive  passwords.  It  is  patched  by  now,  but   unpatched  versions  of  Firefox  or
                users who do not have updated their MacOS, or those who are still   those  infected  with  Mokes.B  or
                using MacOS 10.11 El Capitan or earlier versions, are at risk.      Netwire.A.  Attackers  can  use  a
                                                                                    backdoor  to  take  screenshots,
              8.  OSX  /  Linker  is  delivered  through  fake  Adobe  Flash  Player
                installers  and  allows  an  attacker  to  run  a  remote  program  on  the   record  keystrokes,  or  exfiltrate
                victim's machine if a malicious disk image gets installed.          user data.
                                                                                  10.OSX  /  CrescentCore  tries  to
                                                                                    monetize downloads and browser
                                                                                    searches on an infected computer
                                                                                    through  scareware,  bloatware,
                                                                                    and  search  hijack  software.  The
                                                                                    large   number   of   potentially
                                                                                    unwanted  programs  (PUPs)  and
                                                                                    adware  installations  not  only
                                                                                    affects  the  performance  of  the
                                                                                    computer  but  can  even  lead  to
                                                                                    complete  failure.  Users  are  also
                                                                                    annoyed  by  unwanted  browser
                                                                                    pages,  countless  pop-ups  and
                                                                                    fake virus warnings.

                                                                                MacOS  users  who  continue  to  think
                                                                                that  their  operating  system  (OS)  is
                                                                                relatively safe from cyber-attacks, and
                                                                                neglect security updates or additional
                                                                                security     measures,      expose
                                                                                themselves to high dangers. Since the
                                                                                protection provided by the OS itself is
                                                                                relatively  weak,  companies  that  use
                                                                                Apple PCs should make sure that they
                                                                                are  using  endpoint  security  solutions
                                                                                that  cover  MacOS  devices  as  well,
                                                                                since  attackers  always  have  a
                                                                                preference for the weakest link in the
                                                                                chain. (Source: SentinelOne) ◊


                                                                                                     By MediaBUZZ


















             September 2020: Cybersecurity & Data Safety: perpetual awareness and innovation presupposed       12
   7   8   9   10   11   12   13   14   15   16   17