Page 12 - AeM_September_2020
P. 12
RESEARCH
ANALYSIS
6. OSX.Loudminer is a 2.5 GB malware that is usually spread by 9. OSX-Mokes and OSX.Netwire /
TRENDS
downloading "cracked" audio software and aims to take over a Wirenet are malware variants
user's computer to create cryptocurrencies. The hackers specifically that imitate legitimate applications
focus on virtual studio software and other processor-intensive and use names such as
applications to mask their cryptomining activities. 'Dropbox', 'Chrome' and 'Firefox'
to avoid detection. Particularly at
7. KeyStealDaemon is malware that benefits from a security loophole risk are MacOS users running
that can access sensitive passwords. It is patched by now, but unpatched versions of Firefox or
users who do not have updated their MacOS, or those who are still those infected with Mokes.B or
using MacOS 10.11 El Capitan or earlier versions, are at risk. Netwire.A. Attackers can use a
backdoor to take screenshots,
8. OSX / Linker is delivered through fake Adobe Flash Player
installers and allows an attacker to run a remote program on the record keystrokes, or exfiltrate
victim's machine if a malicious disk image gets installed. user data.
10.OSX / CrescentCore tries to
monetize downloads and browser
searches on an infected computer
through scareware, bloatware,
and search hijack software. The
large number of potentially
unwanted programs (PUPs) and
adware installations not only
affects the performance of the
computer but can even lead to
complete failure. Users are also
annoyed by unwanted browser
pages, countless pop-ups and
fake virus warnings.
MacOS users who continue to think
that their operating system (OS) is
relatively safe from cyber-attacks, and
neglect security updates or additional
security measures, expose
themselves to high dangers. Since the
protection provided by the OS itself is
relatively weak, companies that use
Apple PCs should make sure that they
are using endpoint security solutions
that cover MacOS devices as well,
since attackers always have a
preference for the weakest link in the
chain. (Source: SentinelOne) ◊
By MediaBUZZ
September 2020: Cybersecurity & Data Safety: perpetual awareness and innovation presupposed 12