Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Mac users beware! Delete these malware-infected apps now

Mac users face a severe threat from proxy trojan malware concealed within popular software downloaded from unofficial sources, compromising system integrity and potentially enabling illicit activities

byEray Eliaçık
December 5, 2023
in Cybersecurity

Cybersecurity threats are evolving, and the latest menace targeting Mac users involves sophisticated proxy trojan malware. This malicious software lurks within seemingly harmless downloads of popular macOS applications, posing a significant risk to the security of your device.

Understanding the proxy trojan threat: Proxy trojan malware surreptitiously transforms infected computers into unwitting traffic-forwarding hubs. These terminals are then utilized to anonymize illicit activities, including hacking, phishing, and facilitating transactions for illegal goods. The insidious nature of this malware lies in its ability to mask its presence while exploiting your device for harmful purposes.

Mac users beware! Delete these malware-infected apps now
Mac-targeting proxy trojan hides within popular software from unofficial sources, jeopardizing system safety (Image credit)

The dangerous bait

The cybercriminals orchestrating this campaign prey on users seeking cost-free alternatives to premium software. Kaspersky uncovered a distressing trend where 35 widely used applications, including image editors, video converters, and data recovery tools, were tainted with the proxy trojan. Some notable names among the compromised software include:

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

  • 4K Video Donwloader Pro
  • Aiseesoft Mac Video Converter Ultimate
  • Aissessoft Mac Data Recovery
  • AnyMP4 Android Data Recovery for Mac
  • Artstudio Pro
  • AweCleaner
  • Downie 4
  • FonePaw Data Recovery
  • MacDroid
  • MacX Video Converter Pro
  • NetShred X
  • Path Finder
  • Project Office X
  • Sketch
  • SQLPro Studio
  • Vellum
  • Wondershare UniConverter 13

Unlike their legitimate counterparts, which are distributed as disk images, the infected versions are packaged as PKG files. This seemingly innocuous change conceals a malicious intent, as PKG files can execute scripts during installation, inheriting elevated permissions. Once installed, these scripts discreetly trigger the trojan, camouflaging it as a legitimate system process named WindowServer.

The trojan’s stealthy operation

To avoid detection, the trojan leverages clever disguises. It adopts the name “GoogleHelperUpdater.plist,” mimicking a Google configuration file, and taps into macOS’s WindowServer—a genuine system process managing the graphical user interface. This camouflage tactic aims to operate seamlessly within routine system functions, evading suspicion.

Mac users beware! Delete these malware-infected apps now
Cybercriminals embed harmful code in PKG files, granting stealthy access to execute malicious operations (Image credit)

Upon activation, the trojan establishes a connection with its command and control (C2) server via DNS-over-HTTPS (DoH). While Kaspersky couldn’t observe specific commands in action, analysis suggests its capability to create TCP or UDP connections, enabling proxy activities as directed by the operators.

The same C2 infrastructure hosts proxy trojan payloads designed for Android and Windows systems. This broad approach indicates that the cybercriminals behind these attacks are targeting a wide spectrum of devices and operating systems.

Stay vigilant

In the face of this escalating threat, exercising caution while downloading software is paramount. Stick to official sources for software acquisition, avoid downloading from unverified or pirated sources, and regularly update your security software to shield your Mac from evolving threats.

Being informed and vigilant remains the strongest defense against these malicious attempts to compromise your device and data.

Stay wary and protected.

Featured image credit: Tianyi Ma/Unsplash

Tags: mactrojan

Related Posts

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

October 14, 2025
Microsoft Edge restricts IE mode after zero-day exploit

Microsoft Edge restricts IE mode after zero-day exploit

October 14, 2025
Verizon down: Latest Verizon outage map for service issues

Verizon down: Latest Verizon outage map for service issues

October 10, 2025
A critical Oracle zero-day flaw is being actively abused by hackers

A critical Oracle zero-day flaw is being actively abused by hackers

October 10, 2025
The Windows 10 doomsday clock is ticking for 500 million users

The Windows 10 doomsday clock is ticking for 500 million users

October 10, 2025
Hack an iPhone and Apple will pay you up to  million

Hack an iPhone and Apple will pay you up to $5 million

October 10, 2025

LATEST NEWS

NVTS stock skyrockets 27%: What is the correlation between Navitas and Nvidia

ChatGPT Android beta includes direct messaging

HP revealed a “League of Legends laptop” for $1,999

Samsung is not done with Bixby after all

Slack’s next-gen Slackbot aims to give “every employee AI superpowers”

Google integrates its viral Nano Banana AI into everyday tools

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.