We are continuously focusing in our last few blogs.Where most of gigantic software platforms running out all over to securing their networks.

COVID-19 epidemic on top, leading to change the network terminology. In past, integrated network model was more secured, aligning resources at preferred locations ensured better communication channels.

Now, search for new network model is on. Leads to an opportunity for new technology leads, opening markets.

Even MacOS considered more secured and trusted network, getting hit of malware.

First one, Cyber security company Intego has discovered new malware that disguises itself as a flash player. What is most concerning is that it is being distributed via webpages that appear in Google search results.

Intego has discovered a new Trojan that is specifically designed to circumvent macOS Catalina’s security measures – it describes in its security blog here. A Trojan is a type of malware that pretends to be legitimate software, in this case a flash player, and is then installed on their own computer.

MacOS Catalina has a number of precautions to prevent the installation of malware that include verifying that the apps developers are registered with Apple and if they aren’t warning users and making it more difficult to install the program. It’s possible to install such a program but it is necessary to make changes in the system settings to go.

This particular Trojan is able to bypass these security restrictions because it launches an installation that gives guides through the user through the steps necessary to install it.

And, one of the most dangerous hit of this Trojan it can be found on Google’s search results page reports AppInsider.

Right as July of this year began, we noticed an emerging malware dubbed by most as ThiefQuest (also known as EvilQuest), a threat that targets macOS devices, encrypts files, and installs keyloggers in affected systems.  It has been found in pirated versions of macOS shared on popular torrent sites. Developments on the malware have been reported by MalwareBytesBleepingComputer and security researchers Dinesh Devadoss, Phil Stokes, Patrick Wardle, and Thomas Reed.

The aforementioned reports state the assumption that the malware’s ransomware activity is not its main attack method; rather, it is a pre-emptive move to disguise its other capabilities such as file exfiltration, Command and Control (C&C) communication, and keylogging. This assumption is also supported by our recent discoveries.

Our discoveries, positive approach, against these malware hits. Apples approach is to consider this research as unpaid benefitted job. Lead techgiant immensely investing in smooth and classic OS.

Pin It on Pinterest

Share This