Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Bootleg Apple Software Hides Cryptomining Malware On Macs
Facebook   X   LinkedIn   Email

Bootleg Apple Software Hides Cryptomining Malware On Macs

December 8, 2024

For those keeping up with technology news, it’s not often Macs make hacking headlines. And for those who are simply Mac lovers, it’s not wise to think hacks happen only to Androids since both are vulnerable. A recent finding linking bootleg Apple software, malware, and cryptomining is a lesson all users can learn from. After all, a successful attack on Macs can end up targeting Androids, too.

Not detected until recently, security researchers at Jamf Threat Labs found a bootleg version of Final Cut Pro Apple software hiding cryptomining malware. Mac users who downloaded this unlicensed version of the $299.99 editing software found their device being used to mine cryptocurrency. Cryptomining needs immense power to work, and some miners choose to steal power from compromised devices.

Jamf did some digging to find where this plagiarized version of Final Cut Pro was hiding. Their hunch led them to The Pirate Bay, a website infamous for offering bootleg software. Jamf found an uploader well-known for posting bootleg versions of Mac software for years, including malware-packed versions of Photoshop and Logic Pro software, is the culprit they were looking for. Otherwise known as “wtfisthat34698409672” they also learned this cybercriminal uploads variants of the malicious code in addition to posting the pirated Final Cut Pro malware.

It's All About Power, Cryptomining Power

In their research, Jamf learned the hacker began uploading pirated Mac software in 2019, and it’s been evolving ever since. They find the dozens of pirated downloads since then all have the cryptomining payload installed, but the author took steps to hide the mining from the infected device user.

Jamf says a Mac user who downloaded the pirated Final Cut Pro app may find their CPU is running hotter than usual, all the while unaware, Jamf says they are “…unwittingly mining crypto for the attacker, and opens the Activity Monitor to confirm their suspicion, the malware stops its activity and hides until the next time the victim launches the application.”

There’s a smart way to prevent a device from being infected by pirated software, and that is NOT downloading anything from third party sites. It’s well known these sites are often rife with malware-infused software apps and programs. Both Apple App Store and Google Play scan for malware before posting anything for download and should a third-party site claim they do the same, get out before it’s too late. Fixing a cryptomining-compromised device is a headache no one wants, so be smart and always avoid pirated software, mateys!


Is Sideloading Worth The Risk Of Downloading Malware?

Your Security

Is Sideloading Worth The Risk Of Downloading Malware?

It’s been well-known that sideloading apps is a risky proposition. Just ask the 20 million Aptoide users who recently learned their personally identifiable information (PII) was posted online by a hacker. Aptoide, a popular third-party app “discovery platform” had its database hacked earlier this month. The cybercriminal behind the hack claims that in addition to the 20 million exposed data files, there’s an additional 19 million files in their possession. Whether that’s true or not remains a mystery for now, but the Aptoide incident shows (in a huge way) why app sideloading is risky at best and is not recommended by security professionals. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...