![]() When the virus retrieves the master password for Keychain, it uploads usernames and passwords stored in Google Chrome to the same remote server. This is the default encrypted space where all passwords on a macOS machine are stored. XCSSET malware attempts to trick victims into giving it access to iCloud’s Keychain. Google’s Chrome browser isn’t safe either. This lets the bad actors log in using the victim’s accounts. Then the criminals upload it to a remote server that they control. Once a machine has been infected, a malicious AppleScript file is used to compress the folder containing Telegram data into a ZIP archive file. But the targeting of different applications within the macOS system is new. The malware has been known to security researchers for some time. This proved to be a huge leap forward, as it seemingly disregarded the security updates that came with the operating system. Tinkering with the code, hackers altered the abilities to now be compatible with Apple’s operating system updates.īy doing so, the malware could infect macOS 11 Big Sur machines and the latest devices that made use of Apple’s new M1 processor chips. Cybersecurity researchers at TrendMicro noticed in April this year that the XCSSET malware received its first upgrade.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |