Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware,
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems.
Jamf Threat Labs, which made the discovery, said the XMRig coin miner was executed as Final Cut Pro, a video editing software from Apple, which contained an unauthorized modification.
« This malware makes use of the Invisible Internet Project (i2p) […] to download
Jamf Threat Labs, which made the discovery, said the XMRig coin miner was executed as Final Cut Pro, a video editing software from Apple, which contained an unauthorized modification.
« This malware makes use of the Invisible Internet Project (i2p) […] to download
,
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems.
Jamf Threat Labs, which made the discovery, said the XMRig coin miner was executed as Final Cut Pro, a video editing software from Apple, which contained an unauthorized modification.
« This malware makes use of the Invisible Internet Project (i2p) […] to download
Jamf Threat Labs, which made the discovery, said the XMRig coin miner was executed as Final Cut Pro, a video editing software from Apple, which contained an unauthorized modification.
« This malware makes use of the Invisible Internet Project (i2p) […] to download
, ,
https://thehackernews.com/2023/02/hackers-using-trojanized-macos-apps-to.html