Remove Adware Remove Download Remove Encryption
article thumbnail

Convuster: macOS adware now in Rust

SecureList

Traditionally, most malicious objects detected on the macOS platform are adware: besides the already familiar Shlayer family , the TOP 10 includes Bnodlero, Cimpli, Adload and Pirrit adware. The analysis showed these executables to be a new adware program, that has subsequently been called Convuster. Introduction. Distribution.

Adware 145
article thumbnail

macOS: Bashed Apples of Shlayer and Bundlore

Security Affairs

Though these scripts have slight variations, they mostly belong to a plague of adware strains— Shlayer and Bundlore. The malicious shell scripts used by Shlayer and Bundlore are usually malvertising-focused adware bundlers using shell scripts in the kill chain to download and install an adware payload.

Adware 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Good old malware for the new Apple Silicon platform

SecureList

Encrypting user files. This payload uses JavaScript API to run bash commands in order to download a JSON configuration file. Downloading of JSON config. And after successfully downloading that configuration file, the sample extracts a URL from the downloadURL field for the next download. Frequently Asked Questions.

Malware 145
article thumbnail

Lumma/Amadey: fake CAPTCHAs want to know if you’re human

SecureList

Our recent research into the adware landscape revealed that this malicious CAPTCHA is spreading through a variety of online resources that have nothing to do with games: adult sites, file-sharing services, betting platforms, anime resources, and web apps monetizing through traffic. One of the modules can also take screenshots.

Adware 121
article thumbnail

IT threat evolution in Q3 2024. Non-mobile statistics

SecureList

This type of cyberextortion predated Trojans, which encrypt the victim’s files. New ransomware modifications, Q3 2023 — Q3 2024 ( download ) Number of users attacked by ransomware Trojans Despite the decrease in new variants, the number of users encountering ransomware has increased compared to the second quarter. 2 China 0.95

Mobile 106
article thumbnail

IT threat evolution in Q1 2024. Mobile statistics

SecureList

million attacks using malware, adware, or unwanted mobile software were blocked. The most common threat to mobile devices was adware: 46% of all threats detected. For example, we found Trojan-Spy.AndroidOS.Agent.ahu, a Trojan hidden inside a WhatsApp mod, that steals encrypted messenger databases along with their decryption keys.

Mobile 109
article thumbnail

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

Although the campaign has not reached the magnitude of the Zacinlo adware campaign, it is already infecting users worldwide.” When executed, a rootkit driver is installed to hide the malware and ensure persistence, then it connects the C2 to download and install additional components.

Spyware 107