Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Mac users beware! Delete these malware-infected apps now

Mac users face a severe threat from proxy trojan malware concealed within popular software downloaded from unofficial sources, compromising system integrity and potentially enabling illicit activities

byEray Eliaçık
December 5, 2023
in Cybersecurity
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Cybersecurity threats are evolving, and the latest menace targeting Mac users involves sophisticated proxy trojan malware. This malicious software lurks within seemingly harmless downloads of popular macOS applications, posing a significant risk to the security of your device.

Understanding the proxy trojan threat: Proxy trojan malware surreptitiously transforms infected computers into unwitting traffic-forwarding hubs. These terminals are then utilized to anonymize illicit activities, including hacking, phishing, and facilitating transactions for illegal goods. The insidious nature of this malware lies in its ability to mask its presence while exploiting your device for harmful purposes.

Mac users beware! Delete these malware-infected apps now
Mac-targeting proxy trojan hides within popular software from unofficial sources, jeopardizing system safety (Image credit)

The dangerous bait

The cybercriminals orchestrating this campaign prey on users seeking cost-free alternatives to premium software. Kaspersky uncovered a distressing trend where 35 widely used applications, including image editors, video converters, and data recovery tools, were tainted with the proxy trojan. Some notable names among the compromised software include:

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

  • 4K Video Donwloader Pro
  • Aiseesoft Mac Video Converter Ultimate
  • Aissessoft Mac Data Recovery
  • AnyMP4 Android Data Recovery for Mac
  • Artstudio Pro
  • AweCleaner
  • Downie 4
  • FonePaw Data Recovery
  • MacDroid
  • MacX Video Converter Pro
  • NetShred X
  • Path Finder
  • Project Office X
  • Sketch
  • SQLPro Studio
  • Vellum
  • Wondershare UniConverter 13

Unlike their legitimate counterparts, which are distributed as disk images, the infected versions are packaged as PKG files. This seemingly innocuous change conceals a malicious intent, as PKG files can execute scripts during installation, inheriting elevated permissions. Once installed, these scripts discreetly trigger the trojan, camouflaging it as a legitimate system process named WindowServer.

The trojan’s stealthy operation

To avoid detection, the trojan leverages clever disguises. It adopts the name “GoogleHelperUpdater.plist,” mimicking a Google configuration file, and taps into macOS’s WindowServer—a genuine system process managing the graphical user interface. This camouflage tactic aims to operate seamlessly within routine system functions, evading suspicion.

Mac users beware! Delete these malware-infected apps now
Cybercriminals embed harmful code in PKG files, granting stealthy access to execute malicious operations (Image credit)

Upon activation, the trojan establishes a connection with its command and control (C2) server via DNS-over-HTTPS (DoH). While Kaspersky couldn’t observe specific commands in action, analysis suggests its capability to create TCP or UDP connections, enabling proxy activities as directed by the operators.

The same C2 infrastructure hosts proxy trojan payloads designed for Android and Windows systems. This broad approach indicates that the cybercriminals behind these attacks are targeting a wide spectrum of devices and operating systems.

Stay vigilant

In the face of this escalating threat, exercising caution while downloading software is paramount. Stick to official sources for software acquisition, avoid downloading from unverified or pirated sources, and regularly update your security software to shield your Mac from evolving threats.

Being informed and vigilant remains the strongest defense against these malicious attempts to compromise your device and data.

Stay wary and protected.

Featured image credit: Tianyi Ma/Unsplash

Tags: mactrojan

Related Posts

The digital impersonators: How cybercriminals hijack your brand to launch malvertising attacks

The digital impersonators: How cybercriminals hijack your brand to launch malvertising attacks

December 12, 2025
Google details security guardrails for Chrome’s new AI agents

Google details security guardrails for Chrome’s new AI agents

December 9, 2025
Must not miss: Permanent Windows 11 patch fixes setup binaries and WinRE

Must not miss: Permanent Windows 11 patch fixes setup binaries and WinRE

December 8, 2025
US agency warns Google, Microsoft, Apple users to secure their accounts

US agency warns Google, Microsoft, Apple users to secure their accounts

December 8, 2025
Meta claims AI reduced hacks by 30% as it revamps support tools

Meta claims AI reduced hacks by 30% as it revamps support tools

December 5, 2025
A critical flaw in Apple Podcasts allows automatic app launches

A critical flaw in Apple Podcasts allows automatic app launches

December 2, 2025

LATEST NEWS

India mandates continuous SIM binding for WhatsApp and Telegram

Amazon launches Ask this Book AI feature for Kindle iOS app

Uber launches YOUBER year-in-review for US users

Rivian announces home-grown AI assistant coming to all R1 vehicles in 2026

Google wipes Disney AI videos from YouTube following legal threat

OpenAI exec says your typing speed is the main bottleneck to AGI

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.