Apple’s macOS is once again in the spotlight with a new type of malware attack that steals files from targeted computers.
These files may contain sensitive information and, if accessed by perpetrators, could be used to commit further crimes.
If you own an Apple device running macOS on an Intel or ARM silicon chip, here’s what you need to know.
What we know about the “Cuckoo” malware
The “Cuckoo” malware is Security provider Kanjiis a new type of malware that carefully searches for files linked to specific applications on your Mac or MacBook and extracts as much data as possible. It is designed to collect a wide range of information including details about the hardware installed on your system, active processes, applications, etc.
Additionally, Cuckoo can capture screenshots and access data from a variety of sources, including sensitive iCloud keychains, Apple Notes, web browsers, and popular communication apps such as Discord, Telegram, Steam, and cryptocurrency wallets. Masu.
More information: Two new stealthy malware threats are targeting users with Macs
How does it work?
Cuckoo is distributed through a malicious website that advertises a purported tool to rip music from streaming services and convert it to .MP3 files. This tool is available in free and paid versions and users are tempted to download and install it. Once installed, this malware relies on annoying persistent pop-ups using LaunchAgent, a method used in other malware campaigns. Like XLoader.
Who is behind the cuckoo?
No single attacker was responsible for this malware campaign. Still, it is worth noting that Cuckoo refuses to work if it is located in certain countries (Kazakhstan, Russia, Belarus, Ukraine, Armenia, etc.). This could mean that they are from one of these groups of countries or that they operate outside of this region. whole.
However, Hacker News reported that “each malicious application contains a separate application bundle within its resource directory,” the researchers reported. Translation: A large quantity of defective items was found wrapped inside a bundle of other defective items.
How to unlock special features on your iPhone to improve voice search
Read more: Beware of encrypted PDFs as the latest method to deliver malware
How to protect yourself from malware attacks
So how can we protect ourselves from this malware attack and other threats targeting our technology running macOS? After all, they can be sophisticated and sneaky, so keep your eyes peeled. It will be difficult to recognize even if it is in front of . Don’t worry, that’s why I’m here. They don’t call me Cyber Guy for nothing. thank you for helping me. Here are nine steps to improve your cybersecurity and protect your digital life.
1. Use good antivirus software: Install and maintain reliable antivirus protection for macOS. The best way to protect yourself from clicking on malicious links that install malware that can access your personal information is to install antivirus protection on all your devices. This can also alert you to phishing emails and ransomware scams. Make sure it is set to update automatically and run regular scans. Get my picks for the best antivirus protection products of 2024 for Windows, Mac, Android, and iOS devices.
2. Don’t get software from strangers: Always download software from trusted and official sources. Do not download applications from third-party websites or links contained in unsolicited emails or messages.
3. Check the software manufacturer’s credentials: Before installing any software, check the developer’s credentials and read reviews to confirm its legitimacy. This is especially important for software that handles sensitive information.
4. Keep it fresh.Perform regular updates: Keeps macOS and all installed applications. Latest. Software updates often include patches for security vulnerabilities that malware can exploit.
CLICK HERE TO GET FOX BUSINESS ON THE GO
5. Enable the firewall: Monitor incoming and outgoing connections using the macOS built-in firewall or a third-party firewall. Turning it on increases your safety by allowing you to detect and block malicious activity.
6. Beware of strange requests: Be wary of unsolicited requests to access your computer or install software, especially from pop-ups or emails you don’t recognize. A rule I follow is to never engage or respond if you haven’t asked for it. This makes it difficult for criminal hackers to access your life.
7. Use strong passwords and 2FA: To enable two-factor authentication Enhances overall security.
8. Back up your data: regularly Back up important data Connect to external drives and cloud-based services. This ensures that your data can be recovered even in the event of a malware attack. It’s a good idea to also keep sensitive files on your hard drive to make it harder for hackers to get hold of your valuable data. I regularly connect a portable USB drive to my computer to back up important files, photos, and records, then remove it and store it in a safe place at home.
9. Create a strong password. Use unique passwords for different accounts, password manager to track them. Who can remember all those complex passwords? That’s why password managers are so effective at storing and retrieving passwords.
Read more: How cryptocurrency scammers regularly use them to infect Macs with malware
Cart important points
As I mentioned earlier, one of the selling points of Mac computers is that people tend to believe that they are more vulnerable to cyberattacks than Windows PCs. But this is clearly not the case, and Mac owners need to be aware of what’s out there to stay safe not only from this particular threat, but also from new threats that emerge faster than patches can be applied. need to do it.
CLICK HERE TO GET THE FOX NEWS APP
With cyberattacks targeting Macs and MacBooks on the rise, have you added protection to fend off the bad guys? Worse yet, have you been infected yet? Email us Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter
Ask your cart a question or let us know your story you’d like us to feature.
Answers to CyberGuy frequently asked questions:
Copyright 2024 CyberGuy.com. All rights reserved.