A malware the young man, referred to as the Cuckoo, but the spread between the applications, to the Mac, to third parties, including placing at risk the safety and security of the sensitive data of the users. This malware is a sophisticated, is able to steal a wide range of information, from the specification of the hardware of the Mac-it is your up to the notes, passwords, and even the pictures on the screen of a computer, while you are using it.
Cuckoo was discovered by Kandji, a company that specializes in the security of the devices, the Apple. In a recent report, Kandji gave the details of cut with respect to the nature and capabilities of the malware, highlighting the need for increased awareness and attention, the biggest among the users, for Mac users.
DumpMedia Spotify Music, and other applications: the trust of the Cuckoo
According to the report, Kandji, Cuckoo first appeared in a application to download music and Spotify called “the DumpMedia Spotify Music”. This app, which promises to help users to extract music out of Spotify and download it in MP3 format, it has proven to be a vehicle for the distribution of malware.
Further investigation revealed the presence of a Cuckoo in a variety of other applications softuerësh of the download and the time of the music to the third parties, on your iPhone/Android, to be distributed out of the pages of the website as a “tunesolo[.]com, fonedog[.]com, tunesfun[.]com, tunefab[ .]com”.
As the piercing Cuckoo on a Mac
The ratio of Kandji is focused on the DumpMedia Spotify Music, and the first place where it was discovered, Cuckoo. Unlike the vast majority of the applications were legitimate concerns Like the spread out of the App Store, it is the official Apple, all of which require the user to pull the app from the file, DMG file to the applications, DumpMedia Spotify Music, inviting the user to klikojë right-click on the application and select “Open” .
As soon as you start the installation, the malware begins to collect information from the device, the host, while the DumpMedia Spotify Music continue to install it, and open in order to hide the activities of the Cuckoo.
Once installed, the Cuckoo goes directly to the work, by bringing in a wide range of information, from the Mac to the infected. Among the data stolen are the details about the hardware of the Mac-it's your information on the application of the equipment and processes in place, the information presented in the Apple's Notes, and the applications of messages, such as Discord and Telegram, the history of the Safari, and cookies, and sensitive information stored in the iCloud Keychain.
Cuckoo's also the ability to hold information in real time, taking the appearance of your home without the understanding the user to the screen of his actual being recorded.
Both the new and the old are in danger of
Kandji, says that the Cuckoo can be attempted as the Cat-people of the most ancient, based on the Intel, as well as the computer most of the young people of the Silicon to the Mac (M1, M2, M3, etc.) by making the potential for a wide range of devices, and Apple is to be vulnerable.
All but one of the applications identified above, which contain the program and malicious Cuckoo, was registered with an ID to be valid, the developer of the track in the Yian Technology Shenzhen Co., Ltd. The ID-which is the developer of the app Fonedog be connected to the FoneDog Technology Limited.
According to the Kandji, you are likely to have websites, and other applications that are malware that have not been discovered yet. Therefore, the company believes that there is a network of the most extensive after the delivery of the code is malicious, for the Mac, taking into account the presence of more than the register of the related applications can be infected.
Must be peace and understanding...
In light of this threat is new, it is essential that the user of a Mac is to continue to exercise caution when downloading apps from the developer of the unknown third-party. To raise awareness of the risks, and that the adoption of the best practices of safety and security, such as downloading apps only from trusted sources, and the use of the software to be up-to-date anti malware program, it may help to protect the sensitive data and the protection of the Cat's out of the Cuckoo, and the threats of similar.
Discussion about this post