Beware of Fake Browser Updates Targeting Mac Systems

The ClearFake campaign, previously targeting Windows systems, has expanded to target macOS systems with the Atomic Stealer malware. ClearFake utilizes compromised WordPress sites to deliver fraudulent web browser update notices, leading to the deployment of stealers and other malware. Atomic Stealer, a commercial malware family, is sold on a subscription basis and can siphon data from web browsers and cryptocurrency wallets. This development highlights the continued reliance of stealer malware on fake or poisoned installer files and other deceptive techniques for propagation. Additionally, the LummaC2 stealer has introduced a new feature that claims to gather persistent Google Account cookies, potentially enabling hackers to infiltrate accounts and perform significant attacks.
- ClearFake Campaign Expands to Target Mac Systems with Atomic Stealer The Hacker News
- Fake Safari and Chrome Updates Infecting Macs with AMOS Malware Beebom
- Fake Browser Updates Targeting Mac Systems With Infostealer DARKReading
- Fake Safari and Chrome update scam is affecting Mac users: All the details Times of India
- Hackers now spreading Mac malware via fake browser updates — don't fall for this Tom's Guide
Reading Insights
0
0
2 min
vs 3 min read
77%
483 → 109 words
Want the full story? Read the original article
Read on The Hacker News