Connect with us

Technology

Two new stealthy malware threats are targeting those of you who use Macs

Published

on

Two new stealthy malware threats are targeting those of you who use Macs

Join Fox News for access to this content

Plus special access to select articles and other premium content with your account – free of charge.

Please enter a valid email address.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. To access the content, check your email and follow the instructions provided.

Having trouble? Click here.

If you use a Mac, it could be at risk of two new threats. While Apple has a reputation for having ironclad security, these two pieces of malware are designed to trick you and steal your data.

Jamf Threat Labs, an organization that focuses on the safety of Apple products, says the malware threats are part of a year-long attack on Mac systems.  

Advertisement

The group says hackers are using them to harvest data.  Attacks like these are constantly happening, according to the lab. That makes it all the more important for those who use a Mac to ensure your data is locked down.

It’s important to note that, according to the lab, these hackers largely target the crypto industry, putting those individuals, particularly, at risk. That said, all Mac users should still exercise caution.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

MacBook Pro  (Kurt “CyberGuy” Knutsson)

Malware posing as ads

Before we get into the malware, let’s talk about Arc Browser. For those unfamiliar with it, Arc Browser is a Mac web browser that looks to give users a unique experience. First and foremost, the main focus is on the webpage. Any buttons you might find in a traditional browser are relegated to a sidebar. It uses a bookmark system that gives you multiple workspaces. It also has automated tab management.

Advertisement

In other words, many Mac users would consider Arc Browser an upgrade over the already-included Safari. And its ever-growing popularity makes it a huge target for hackers.

ARC browser

Legitimate Arc Browser website  (Kurt “CyberGuy” Knutsson)

MORE: HOW CRYPTO IMPOSTERS ARE USING CALENDY TO INFECT MACS WITH MALWARE

How fake Arc Web Browser ads conceal dangerous malware

In this attack, hackers are hiding malware in advertisements posing as ads for Arc Browser, as seen below.

FAKE arc site

Malicious site aricl[.]net that imitates the legitimate arc.net  (Jamf Threat Labs)

The ad redirects to a malicious lookalike site: arc.net vs. aricl.net

Instead of taking you to the legitimate download page for the Arc web browser, the ad takes you to a lookalike malicious site, aricl[.]net, that imitates the legitimate arc.net and hosts malware.

fake arc site 2

Image of the malicious aricl[.]net site  (Jamf Threat Labs)

Malware disguised as Arc Browser unleashes Atomic Stealer

Once you download malware posing as Arc Browser, the malware unleashes an Atomic stealer. It’s a fake prompt that looks like a normal System Preferences prompt asking you for your password. Once the hackers get access to your system password, they can steal other data.

Advertisement
system preferences

Fake system preferences prompt  (Jamf Threat Labs)

Even worse, these so-called “ads” can appear as sponsored advertisements in a Google search. Jamf Threat Labs says these links can only be accessed through a generated sponsored link and not accessed directly. Attempts to access the malicious website directly returned an error message. This is presumably done to evade detection.

Fake meeting software

The researchers at Jamf Threat Labs have also discovered a fake website that offers malware hidden as free group meeting scheduling software. Meethub[.]gg appears to be legitimate. The company posts articles on Medium and has more than 8,000 followers on X, at the time of publishing. It, however, hosts malware that’s related to Realst, another piece of malware designed to drain crypto wallets.

Some of the attacks involving Meethub use social engineering. A hacker might approach their victim looking to interview them for a job or a podcast. In order to meet, they ask the victim to download Meethub’s software. According to Jamf, these attacks can sometimes lead to big paydays for hackers.

stealthy malware 2

Meethub website  (Jamf Threat Labs)

How to protect yourself

1. Don’t download bootleg software: It’s not worth the risk to download bootleg software. It exposes your device to potential security threats like viruses and spyware.  If someone emails you a link for a download, make sure it’s from a reputable source and scan it.

2. Don’t click on suspicious links or files: If you encounter a link that looks suspicious, misspelled or unfamiliar, avoid clicking on it. Instead, consider going directly to the company’s website by manually typing in the web address or searching for it in a trusted search engine. Most often, the first or second result that comes up is legitimate. If you see the word “Sponsored “above the search result, take a beat before clicking it and consider clicking on the result below it.

Advertisement

3. Have good antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Mac, Windows, Android & iOS devices.

MORE: STEALTHY BACKDOOR MAC MALWARE THAT CAN WIPE OUT YOUR FILES 

What to do if you’ve been hacked

If it has already happened, and you’ve been hacked, then you should take immediate action to minimize the damage and secure your device. Here are some steps that you can follow:

Change your passwords

If hackers have recorded your passwords, they could access your online accounts and steal your data or money. On another device (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn’t recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.

Enable two-factor authentication

You’ll want to activate two-factor authentication for an extra layer of security.

Advertisement

Monitor your accounts and transactions

You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or authorities immediately. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

Use identity theft protection

Identity theft protection companies can monitor personal information like your home title, Social Security number, phone number and email address and alert you if it is being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges, and issue new cards for you.

Alert your contacts

If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

Advertisement

MORE: HOW A FLEW IN iPHONE’S SECURITY COULD LEAVE YOU LOCKED OUT

Kurt’s key takeaways

While Macs are generally secure devices, that hasn’t stopped hackers from stealing data. In fact, these two new attacks show how creative they can be while trying to break into your device. That’s why it’s so important to have good antivirus software and safety practices.

Good safety practices are even more essential for people who trade and use cryptocurrencies in these particular situations. As mentioned before, these attacks focus largely on draining crypto wallets. And while anyone can be hacked, crypto users have a higher risk. So take the time to assess a link before clicking on it. Don’t just download software because someone tells you to. Do your research. At the end of the day, it will help keep your data and your wallet safe.

Are you worried about hackers finding more creative ways to break into your computer? If you use crypto, how are you keeping your crypto wallet safe? Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Junji Ito’s terrifying Uzumaki hits Adult Swim in September

Published

on

Junji Ito’s terrifying Uzumaki hits Adult Swim in September
Image: Adult Swim

Adult Swim’s long-awaited adaptation of Uzumaki finally has a premiere date — and an appropriately creepy trailer. The series, based on the classic horror manga from Junji Ito, will start airing on September 28th. Episodes will hit Adult Swim first, and then stream on Max the following day.

Uzumaki follows a cursed town that is — and I promise it’s scarier than it sounds — plagued by spirals. Here’s the full synopsis:

“Let’s leave this town together,” asks Shuichi Saito, a former classmate of Kirie Goshima, a high school girl who was born and grew up in Kurouzu-cho. Everything from a strange whirlwind, billowing smoke from the crematorium, and the residents is turning into spirals. People’s eyes spin in whirls, a tongue spirals, and the…

Continue reading…

Continue Reading

Technology

New prosthetics restore natural movement via nerve connection

Published

on

New prosthetics restore natural movement via nerve connection

In the world of prosthetics, a groundbreaking advancement is changing the game for individuals with lower-limb amputations. 

Researchers at MIT, in collaboration with Brigham and Women’s Hospital, have developed a neuroprosthetic system that allows users to control their prosthetic legs using their own nervous systems. 

This innovative approach could bring us closer to a future of fully integrated, naturally controlled artificial limbs.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

A person wearing the neuroprosthetic system (Hugh Herr and Hyungeun Song)

Advertisement

The AMI: A surgical game-changer

At the heart of this breakthrough is a surgical procedure known as the agonist-antagonist myoneural interface, or AMI. Unlike traditional amputation methods, the AMI reconnects muscles in the residual limb, preserving the natural push-pull dynamics of muscle pairs. This seemingly simple change has profound implications for prosthetic control and function.

prosthetics 2

Illustration of how the neuroprosthetic system works (MIT Media Lab)

Dr. Hugh Herr, a professor at MIT and senior author of the study, explained the significance: “This is the first prosthetic study in history that shows a leg prosthesis under full neural modulation, where a biomimetic gait emerges. No one has been able to show this level of brain control that produces a natural gait, where the human’s nervous system is controlling the movement, not a robotic control algorithm.”

HOW TO STOP ANNOYING ROBOCALLS

prosthetics 3

Dr. Hugh Herr pictured with the neuroprosthetic system (Jimmy Day, MIT Media Lab)

AI-DRIVEN EXOSKELETON LIGHTENS YOUR LOAD AND ELEVATES PERFORMANCES

The power of proprioception

The key advantage of the AMI system is its ability to provide users with proprioceptive feedback, the sense of where their limb is in space. This sensory information, often taken for granted by those with intact limbs, is crucial for natural movement and control. With the AMI, patients regain a portion of this vital feedback, allowing them to walk more naturally and confidently.

Advertisement

In the study, seven patients with AMI surgery were compared to seven with traditional amputations. The results were striking. AMI patients walked faster, navigated obstacles more easily and climbed stairs with greater agility. They also demonstrated more natural movements, such as pointing their toes upward when stepping over obstacles, a subtle but important aspect of a natural gait.

CYBERCRIMINALS TAKING ADVANTAGE OF CROWDSTRIKE-LINKED GLOBAL COMPUTER OUTAGE

prosthetics 4

A person wearing the neuroprosthetic system (Hugh Herr and Hyungeun Song)

CLICK HERE FOR MORE US NEWS

Adapting to real-world challenges

One of the most impressive aspects of the AMI system is its versatility. Patients were able to adapt their gait to various real-world conditions, including walking on slopes and navigating stairs. This adaptability is crucial for everyday life, where terrain and challenges can change rapidly.

The system’s responsiveness was put to the test in an obstacle-crossing trial. AMI patients were able to modify their gait to clear obstacles more effectively than those with traditional prosthetics. This ability to rapidly adjust to unexpected challenges is a hallmark of natural limb function and represents a significant leap forward in prosthetic technology.

Advertisement
prosthetics 5

A person wearing the neuroprosthetic system (Hugh Herr and Hyungeun Song)

AI WEARABLE CONTRAPTION GIVES YOU SUPERHUMAN STRENGTH

The science of sensory feedback

The success of the AMI system hinges on its ability to augment residual muscle afferents, which are the sensory signals sent from muscles to the nervous system. Remarkably, even a modest increase in these signals allows for significantly improved control and function. This finding highlights the incredible adaptability of the human nervous system and its ability to integrate and utilize even partial sensory information.

Dr. Hyungeun Song, lead author of the study, notes: “One of the main findings here is that a small increase in neural feedback from your amputated limb can restore significant bionic neural controllability, to a point where you allow people to directly neurally control the speed of walking, adapt to different terrain and avoid obstacles.”

prosthetics 6

A person wearing the neuroprosthetic system (Hugh Herr and Hyungeun Song)

Looking to the future

While this research represents a significant step forward, it’s just the beginning. The team at MIT is exploring ways to further enhance sensory feedback and improve the integration between the human nervous system and prosthetic devices. The AMI procedure has already been performed on about 60 patients worldwide, including those with arm amputations, suggesting broad applicability across different types of limb loss.

Advertisement

As this technology continues to evolve, we may see even more natural and intuitive control of artificial limbs. The ultimate goal is to create prosthetics that feel and function like a natural part of the user’s body, blurring the line between human and machine.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

prosthetics 7

A person wearing the neuroprosthetic system (Hugh Herr and Hyungeun Song)

Kurt’s key takeaways

The development of prosthetic limbs controlled by the nervous system marks the beginning of a new era in bionics. It offers hope for improved mobility, independence and quality of life for millions of people living with limb loss. Moreover, it provides valuable insights into the plasticity of the human nervous system and our ability to integrate with advanced technology.

As we continue to push the boundaries of what’s possible in merging biology and technology, we open up new frontiers in human augmentation and rehabilitation. The implications extend far beyond prosthetics, potentially influencing fields such as neurology, robotics and even our understanding of human consciousness and embodiment.

Advertisement

How comfortable would you be with technology that directly interfaces with your nervous system? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Here’s your first look at Amazon’s Like a Dragon: Yakuza

Published

on

Here’s your first look at Amazon’s Like a Dragon: Yakuza

Amazon says that the show “showcases modern Japan and the dramatic stories of these intense characters, such as the legendary Kazuma Kiryu, that games in the past have not been able to explore.” Kiryu will be played by Ryoma Takeuchi, while Kento Kaku also starts as Akira Nishikiyama. The series is directed by Masaharu Take.

Like a Dragon: Yakuza starts streaming on Prime Video on October 24th with its first three episodes.

Continue Reading
Advertisement

Trending