– The macOS information thief, Atomic, is now being delivered via a fake web browser update chain, known as ClearFake.
– This is likely the first incidence of a social engineering campaign, originally for Windows, expanding geolocation and operating system reach.
– The insight was given by Jérôme Segura from Malwarebytes in Tuesday’s analysis.
MacOS users find themselves under duress as the information-stealing malware, appropriately nicknamed Atomic, has now found another delivery route. Instead of the traditional postal service, Atomic now gets a free ride via a fake web browser update chain, termed as ClearFake. Much like those instances when you order a pizza only to find anchovies as uninvited guests, Atomic latches on to your macOS systems through these fabricated updates.
Segura from Malwarebytes noted a unique aspect of this malware mess, saying, “this may very well be the first time we see one of the main social engineering campaigns, previously reserved for Windows, branch out not only in terms of geolocation but also operating system.” Sounds like this malware might be having a mid-life crisis, huh? I guess they always said Windows were just a gateway.
In summary, MacOS users need to step up their defenses – and maybe their antivirus software – as Atomic makes its way into macOS devices through a false browser update pathway known as ClearFake. This potentially marks the dawn of a new era in social engineering campaigns, gravitating from a Windows-only scheme to include macOS systems. Pretty sure that’s not the kind of inclusivity we’ve been pushing for in 2021.
Remember, folks, if you see a suspicious update prompt, approach with caution. Much like dad’s questionable jokes at family dinners, not everything that seems harmless is indeed so!
Original Article: https://thehackernews.com/2023/11/clearfake-campaign-expands-to-deliver.html
No products in the cart.