Connect with us

Technology

Hackers use pirated software to hijack Mac, Android and Windows devices

Published

on

Hackers use pirated software to hijack Mac, Android and Windows devices

Join Fox News for access to this content

Plus special access to select articles and other premium content with your account – free of charge.

Please enter a valid email address.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. To access the content, check your email and follow the instructions provided.

Having trouble? Click here.

Trading in cryptocurrency? You might be sitting on a pretty penny in that digital wallet of yours. Feels great, doesn’t it? But here’s the catch with digital currency: Keeping it secure isn’t a walk in the park.

Hackers are out there, working overtime to come up with new tricks to swipe your crypto, potentially emptying your wallet in one fell swoop. Yep, for these cyber thieves, your digital cash is the ultimate prize. And the worst part? Most of the time, you won’t even realize you’ve been hit until your balance is zero.

Advertisement

Case in point: There’s this fresh malware out there, specifically targeting macOS, Android and Windows devices. It sneaks in through pirated software, hunting for your cryptocurrency to make it its own. Here’s how it works.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

Woman working on a Mac. (Kurt “CyberGuy” Knutsson)

What is the new malware targeting cryptocurrency users?

The cybersecurity company Kaspersky has uncovered a sophisticated new malware campaign designed to pilfer cryptocurrency from users’ wallets. This campaign leverages pirated or improperly licensed software as a vector for infection, exploiting the common practice of seeking out “free” versions of paid software online.

These cracked applications, distributed through unauthorized websites, are embedded with a Trojan-Proxy type of malware. This malware is not limited to just macOS users, as recent findings have shown; variants targeting Android and Windows platforms have also been discovered, connecting to the same Command and Control (C&C) server. These variants, like their macOS counterparts, are concealed within cracked software, illustrating the widespread risk across different operating systems.

Advertisement

CHICAGO CHILDREN’S HOSPITAL REGAINS ACCESS TO MEDICAL RECORDS A MONTH AFTER CYBERATTACK

Once the malware is downloaded onto your device, it will immediately start checking for Bitcoin and Exodus cryptocurrency wallets. If it discovers either one (which is very unfortunate for some users who have both), the malware replaces the wallet and infects it with another version that’s able to steal the cryptocurrency. For some people, this could amount to thousands of dollars. And, it’s all because you unintentionally downloaded the malware to your macOS, Android and Windows devices.

mac hack 2

Woman typing on Mac. (Kurt “CyberGuy” Knutsson))

MORE: HOW CROOKS ARE USING SKIMMERS AND SHIMMERS TO STEAL YOUR MONEY AT YOUR ATM MACHINE

How does this malware get on your device?

Kaspersky reported that this new malware is coming through cracked software applications online. A cracked software has broken protection, thus making it easier for hackers to infiltrate it with code. With this, the malware’s creator took pre-compromised versions of the pirated software — one example being xScope, a paid macOS utility — and altered a few bytes of code to get the job done.

Then, in February, security firm Jamf found another cryptocurrency-focused macOS malware circulating through a pirated version of Apple’s Final Cut Pro software.

Advertisement

Attackers can use this malware to gain money or perform criminal activities using your device. It is distributed as .PKG installers, which contain scripts that execute after installation, altering system files and setting up the malware to run as a system process.

What pirated applications are being loaded with this malware? 

The pirated applications are versions of software that have been modified to remove or disable features that are only available in paid versions, such as license verification. These applications are often distributed illegally and without the consent of the software creator. These are identified as being loaded with this Trojan-Proxy malware:

  • 4K Image Compressor
  • 4K Video Downloader Pro v4.24.3 macOS
  • Aiseesoft Mac Data Recovery
  • Aiseesoft Mac Video Converter Ultimate
  • Allavsoft
  • AnyMP4 Android Data Recovery for Mac
  • AweCleaner
  • Downie 4
  • FonePaw Data Recovery
  • INet Network Scanner
  • MacDroid
  • MacX Video Converter Pro
  • MouseBoost Pro
  • MWeb Pro
  • NetShred X
  • NetWorker Pro
  • Path Finder
  • Patternodes
  • Perfectly Clear Workbench
  • Print to PDF
  • Project Office X
  • Rocket Typist
  • Sketch
  • SponsorBlock
  • SystemToolkit
  • TransData
  • Vellum
  • VideoDuke
  • Wondershare UniConverter 13
  • SQLPro Studio
  • WinX HD Video Converter for Mac
  • Artstudio Pro
  • Magic Sort List
  • FoneLab Mac Data Retriever
  • Apeaksoft Video Converter Ultimate for Mac

Furthermore, the malware campaign extends beyond macOS, as shown by the fact that Android and Windows platforms are also being targeted by malware that communicates with the same command and control server. The applications or files identified for these platforms are:

  • Android: s276.apk, Swipis_v2.6.1[Mobile].apk
  • Windows: wsclient.exe

The lesson is to avoid downloading pirated software from unauthorized sources to protect yourself from such malware infections.

Mac hack 3

A woman typing on a Mac laptop. (Kurt “CyberGuy” Knutsson)

MORE: STEALTHY BACKDOOR MAC MALWARE THAT CAN WIPE OUT YOUR FILES

The deceptive ‘Activator’ app and its cryptocurrency heist

When you download one of these apps, it launches “Activator,” which prompts you to put in your device’s username and password to install and launch the software, when you think you’re installing an app.

Advertisement

When this happens successfully (or, rather — unsuccessfully to you), the hacker can spy on your device and receive commands from their server. This is when the hacker executes their dirty work: searching for cryptocurrency wallets, replacing them and looting your dough.

Activator app. (Kurt “CyberGuy” Knutsson)

MORE: BEWARE OF FAKE BROWSER UPDATES ON YOUR MAC

Another note that Kaspersky mentioned about this particular malware is that it has been targeting users with the macOS Ventura 13.6, which was just released in September. We don’t know for sure, but this seems to suggest that if you’re not running that, then you might be safe from this hack, this time.

Of course, if you also don’t have cryptocurrency, you’re probably okay, too. However, this unique type of malware that uses pirated software to get on your device is not all that new. Hackers have used this method of exploiting pirated software before, and they’ll do it again.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Advertisement

So, how can you keep yourself safe?

Remember, for the hacker to get the malware on your device, you have to download it. This is done by clicking on a link or a file that’s generally suspicious, but not always. In the case of this threat, hackers understand that cryptocurrency users are probably more tech-savvy than the average person, and are therefore more attuned to hacks that are out there. Because of this, hackers have to find ways to trick you into downloading the malware in the first place. So here are five things you can do to protect yourself.

1) Don’t download bootleg software: It’s not worth the risk to download bootleg software. It exposes your device to potential security threats, such as viruses and spyware. Downloading software from reputable app stores is definitely the way to go to protect your devices.  

2) Don’t click on suspicious links or files: If you encounter a link that looks suspicious, misspelled or unfamiliar, avoid clicking on it. Instead, consider going directly to the company’s website by manually typing in the web address or searching for it in a trusted search engine. Typically, the first or second result that appears is legitimate.

3) Update your device with software regularly: Regularly updating your device’s software is crucial for security because it ensures that you receive the latest patches, bug fixes and security enhancements. These updates help protect your device from vulnerabilities and potential threats that could be exploited by malicious actors.

4) Consider storing your cryptocurrency wallet in an external hard drive: If you do have cryptocurrency, you can always consider storing your wallet in an external hard drive. This storage method means that it’s safe from hackers on the internet.

Advertisement

5) Have good antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Mac, Windows, Android & iOS devices.

Kurt’s key takeaways

A new day comes with new malware that’s targeting those of you who use Mac, Windows and Android devices and who have cryptocurrency wallets. It’s a scary threat that could cost you a lot of money if you’re not careful. But you can protect yourself by following the steps above, so you can enjoy your cryptocurrency without worrying about losing it to hackers.

Do you believe government regulations should play a stronger role in protecting crypto users? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Honor’s Magic 7 Pro looks flagship through and through

Published

on

Honor’s Magic 7 Pro looks flagship through and through

Honor’s flagship Magic 7 Pro launches in the UK and Europe today, powered by the Snapdragon 8 Elite and protected by top-tier water-resistance. It also features a high resolution 200 megapixel telephoto camera.

Arriving a week after the OnePlus 13 and a week before we expect to meet Samsung’s Galaxy S25 phones, the Magic 7 Pro is among the first phones to release outside of China with Qualcomm’s new chipset inside. That makes it one of the most powerful phones on the market, especially with 12GB of RAM. It also features a sizable 5,270mAh battery built around a silicon-carbon chemistry, allowing it to pack more energy into a smaller space with the Magic 7 Pro measuring just 8.8mm thick.

Much like the new OnePlus phone — and, unexpectedly, Motorola’s $299.99 Moto G Power, which launched in the US yesterday — the Magic 7 Pro is both IP68 and IP69-rated. That means that in addition to the usual protection from dust and submersion in water, it should survive exposure to steam and high-pressure water jets — ideal if you regularly use your phone in a jacuzzi, probably overkill for the rest of us.

Yup, it’s thin,
Image: Honor

Also unusual is the phone’s 200 megapixel 3x periscopic camera. We’ve seen megapixel counts as high as this before, but mostly on main cameras, not zoom lenses — with the exception of Vivo’s X100 Ultra and X200 Pro. It’s bolstered by an AI Super Zoom feature that kicks in at 30x zoom for added clarity, with this and a few other camera AI modes using a combination of on-device and cloud-based large language models to fine-tune images.

Advertisement

There’s even more AI than that, since it ships with Android 15 and Google’s Gemini AI app, which Honor has bolstered with its own AI-powered takes on translation and notes apps.

The Magic 7 Pro launched in China last November, but this is its first appearance outside of the country. Honor is one of several Chinese smartphone manufacturers that saw growth in global market share in 2024, thanks in part to last year’s flagship Magic 6 series and the Magic V3, still the thinnest foldable phone available.

Honor Magic 7 Lite.
Image: Honor

For its European launch the Pro is joined by the Magic 7 Lite, a midrange handset that uses the comparatively sluggish Snapdragon 6 Gen 1 chip and arrives still running Android 14. The selling point of that phone is its enormous 6,600mAh battery, which Honor claims will run for three days. There’s no sign of the regular Magic 7, which launched alongside the Pro in China.

The Magic 7 Pro is available to order now from honor.com starting at £1,099.99 / €1,299 (about $1,340), with major retailers and local carriers set to stock it too. The Magic 7 Lite is much cheaper at £399.99 / €369, and also available now.

Advertisement
Continue Reading

Technology

Get ready to experience thrill of eVTOL racing

Published

on

Get ready to experience thrill of eVTOL racing

You might have heard about electric vertical takeoff and landing aircraft (eVTOL). Well, there’s some exciting news coming from Jetson, a Swedish startup that’s making waves in the air racing scene. While Australia’s Airspeeder has been working on crewed eVTOL races, Jetson founder and CTO Tomasz Patan recently took the spotlight with a demonstration that many are calling the start of the world’s first eVTOL air racing.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Jetson eVTOL air racing demonstration (Jetson) (Kurt “CyberGuy” Knutsson)

Airspeeder’s ambitions

Airspeeder has been building momentum since 2017, aiming to establish world championship races with their striking eVTOL aircraft. However, their current races involve remote-controlled vehicles, with pilots safely on the ground. Enter Jetson, who has now demonstrated a crewed flight around a racing pylon, albeit with just one aircraft.

Advertisement
Get ready to experience thrill of eVTOL racing

Jetson eVTOL air racing demonstration (Jetson) (Kurt “CyberGuy” Knutsson)

EVTOL PROTOTYPE PROMISES 150 MPH CITY-TO-CITY HOPS

The Jetson One: A game changer

The star of this show is the Jetson One, a personal eVTOL designed for agility and performance. In a recent video, Patan showcases the aircraft’s nimble capabilities by navigating around a 26-foot-tall pylon. While this demonstration does not quite constitute a full race, it offers a tantalizing preview of what eVTOL racing could look like. Here are some key features of the Jetson One:

  • Dimensions: 8.86 x 5.25 x 3.67 feet
  • Top speed: Software-limited to 63 mph
  • Flight time: 20 minutes per charge
  • Power source: High-discharge Li-ion batteries
  • Control: Joystick-operated
  • Maximum altitude: Over 1,500 feet (~460 m)
  • Pilot requirements: No license needed in the U.S.
Get ready to experience thrill of eVTOL racing

Jetson eVTOL air racing demonstration (Jetson) (Kurt “CyberGuy” Knutsson)

THIS FLYING ELECTRIC VEHICLE BREAKS RECORD WITH 523-MILE NONSTOP FLIGHT

Market response and future plans

The market response to the Jetson One has been remarkable. The company has already confirmed sales of more than 470 units and is now taking orders for the 2026 batch. To secure your place in line, you’ll need to make a non-refundable deposit of $8,000, with the full price tag coming in at $128,000.

Jetson claims that their eVTOL is user-friendly, stating that pilots can master the aircraft in under 60 minutes of flight practice, along with eight simulator sessions. This accessibility could be a game-changer in the personal aviation market.

Advertisement
Get ready to experience thrill of eVTOL racing

Jetson eVTOL air racing demonstration (Jetson) (Kurt “CyberGuy” Knutsson)

REVOLUTIONARY FLYING CAR PROMISES HIGHWAY SPEEDS AND 3-HOUR FLIGHTS

Safety and regulatory considerations

While the prospect of personal eVTOLs and air racing is thrilling, it also raises important safety and regulatory questions. Jetson has implemented several safety features, including:

  • A race car-inspired safety cell design
  • The ability to fly safely with the loss of one motor
  • Hands-free hover and emergency functions
  • A ballistic parachute with rapid deployment

In terms of regulations, Jetson has made progress, securing two flight permits in Italy for personal eVTOL travel in uncontrolled airspace in fall 2023. However, comprehensive racing regulations are yet to be defined.

Get ready to experience thrill of eVTOL racing

Jetson eVTOL air racing demonstration (Jetson) (Kurt “CyberGuy” Knutsson)

The competition: Airspeeder and beyond

While Jetson has made headlines with this demonstration, it’s worth noting that Airspeeder isn’t far behind. They have already created teams and held aerial events, albeit with remote-controlled eVTOLs. Their aircraft boasts impressive specifications, including a top speed of 124 mph and a power-to-weight ratio comparable to Formula 1 cars.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Get ready to experience thrill of eVTOL racing

Jetson eVTOL air racing demonstration (Jetson) (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

The demonstration by Jetson marks a significant milestone in the evolution of personal aviation and air racing. While it does not yet represent a full-fledged race, it is a tangible step towards a future where eVTOL racing could become a reality. As we look to the skies, it is clear that the race for eVTOL supremacy is just beginning.

Advertisement

What are your thoughts on the future of eVTOL racing and personal aviation after reading about Jetson and Airspeeder? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Elon Musk is being sued by the feds over the way he bought Twitter

Published

on

Elon Musk is being sued by the feds over the way he bought Twitter

Elon Musk’s acquisition of Twitter has resulted in a federal lawsuit by the Securities and Exchange Commission alleging that he broke securities laws with a late disclosure, and saved $150 million in the process.

Before Musk agreed to buy Twitter for $44 billion, before he tried to back out of that deal, before he was forced to go through with it, and before he changed its name to X, he started by acquiring a substantial stake in the company but didn’t reveal that fact until weeks later.

The only problem, as the SEC pointed out then, is that by the time he disclosed that stake, it was outside the agency’s required 10-day window. They claim that he should’ve filed his paperwork by March 24th, 2022, instead of when he actually did, on April 4th (and then again on April 5th). During that period, they say he purchased more than $500 million in shares of the company.

However, with only a few days left before the Trump administration takes over and installs a new head of the SEC (along with Elon Musk reportedly snagging an office in the White House complex), it’s unclear how far the lawsuit will go.

The SEC claims Musk cost investors at least $150 million due to the late disclosure and that he harmed any investors who sold stock between March 25th, 2022, and April 1st, 2022. Its lawsuit is seeking the money Elon made as a result of holding off on the disclosure, as well as a civil penalty and other punishments.

Advertisement
Continue Reading

Trending