{"id":24086,"date":"2024-03-05T04:10:29","date_gmt":"2024-03-05T12:10:29","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/03\/05\/news-17816\/"},"modified":"2024-03-05T04:10:29","modified_gmt":"2024-03-05T12:10:29","slug":"news-17816","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/03\/05\/news-17816\/","title":{"rendered":"No \u201cApple magic\u201d as 11% of macOS detections last year came from malware"},"content":{"rendered":"\n<p>We\u2019re going to let you in on a little cybersecurity secret\u2026 There\u2019s malware on Mac computers. There pretty much always has been.<\/p>\n<p>As revealed in our 2024 ThreatDown State of Malware report, a full 11% of all detections recorded by Malwarebytes on Mac computers in 2023 were for different variants of malware\u2014the catch-all term that cybersecurity researchers use to refer to ransomware, trojans, info stealers, worms, viruses, and more.<\/p>\n<p>That 11% figure may not sound imposing but remember that many people today still believe that Apple devices, including Mac computers, are invulnerable to cyberinfections because of some sort of vague \u201cApple magic.\u201d<\/p>\n<p>In reality, \u201cApple magic\u201d is more a byproduct of old advertising (this <a href=\"https:\/\/www.youtube.com\/watch?v=V0feR5grSa4\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2006 commercial from the \u201cI\u2019m a Mac, and I\u2019m a PC\u201d series<\/a> did irreparable harm) and faulty conclusions concerning cybersecurity\u2019s biggest breaches and attacks: People mistakenly believe that because <em>most <\/em>attacks target Windows computers and servers, <em>no<\/em> attacks target Macs.<\/p>\n<p>The truth is far more nuanced, as the visible, overwhelming focus of cyberattacks on Windows machines is a consequence of Microsoft\u2019s long-standing success in business computing.<\/p>\n<p>For decades, every multinational corporation, every local travel agency, every dentist, every hospital, every school, government, and city hall practically ran on Windows. This mass adoption was good for Microsoft and its revenue, but it also drew and maintained the interests of cybercriminals, who would develop malware that could impact the highest number of victims. This is why the biggest attacks, even today, predominantly target Windows-based malware and the sometimes-unpatched vulnerabilities found in Windows software and applications. &nbsp;<\/p>\n<p>Essentially, as Windows is the biggest target, cybercriminals zero in their efforts respectively.<\/p>\n<p>But new information last year revealed that could all be changing.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-mac-malware-tactics-shifted-in-2023\"><strong>Mac malware tactics shifted in 2023<\/strong><\/h2>\n<p>Apple\u2019s desktop and laptop operating system, macOS, represents a 31% share of US desktop operating systems, and roughly 25% of all businesses reportedly utilize Mac devices somewhere in their networks.<\/p>\n<p>Already, the cybercriminals have taken note.<\/p>\n<p>In April 2023, the most successful and dangerous ransomware in the world\u2014LockBit\u2014was found to have a variant developed for Mac. <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/ransomware-in-2023-recap-5-key-takeaways\" target=\"_blank\" rel=\"noreferrer noopener\">Used in at least 1,018 known attacks last year<\/a>, LockBit ransomware, and the operators behind it, destroyed countless businesses, ruined many organizations, and, <a href=\"https:\/\/www.npr.org\/2024\/02\/20\/1232698867\/global-law-enforcement-effort-cracks-down-on-lockbit-ransomware-group\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">according to the US Department of Justice<\/a>, brought in more than $120 million before being disrupted by a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/lockbit-the-worlds-worst-ransomware-is-down\">coordinated law enforcement effort<\/a> in February of this year.<\/p>\n<p>While the LockBit variant for Mac was not operational upon discovery, the LockBit ransomware gang said at the time that it was \u201cactively being developed.\u201d Fortunately, LockBit suffered enormous blows this year, and the ransomware gang is probably less concerned with Mac malware development and more concerned with \u201cavoiding prison.\u201d<\/p>\n<p>Separately, in September 2023, <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/atomic-macos-stealer-delivered-via-malvertising\" target=\"_blank\" rel=\"noreferrer noopener\">Malwarebytes discovered a cybercriminal campaign<\/a> that tricked Mac users into accidentally installing a type of malware that can steal passwords, browser data, cookies, files, and cryptocurrency. The malware, called Atomic Stealer (or AMOS for short) was delivered through \u201c<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/malvertising-this-cyberthreat-isnt-on-the-dark-web-its-on-google\" target=\"_blank\" rel=\"noreferrer noopener\">malvertising<\/a>,\u201d a malware delivery tactic that abuses Google ads to send everyday users to malicious websites that\u2014though they may appear legitimate\u2014fool people into downloading malware.<\/p>\n<p>In this campaign, when users searched on Google for the financial marketing trading app \u201cTradingView,\u201d they were sometimes shown a malicious search result that appeared entirely authentic: a website with TradingView branding was visible, and download buttons for Windows, Mac, and Linux were clearly listed.<\/p>\n<p>But users who clicked the Mac download button instead received AMOS.<\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"835\" height=\"562\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/TradingView.webp\" alt=\"\" class=\"wp-image-105929\" style=\"width:1014px;height:auto\" \/><figcaption class=\"wp-element-caption\">This malvertising site mimics TradingView to fool users into downloading malware for different operating systems.<\/figcaption><\/figure>\n<p>Just months later, AMOS again wriggled its way onto Mac computers, this time through a new delivery chain that has more typically targeted Windows users.<\/p>\n<p>In November, Malwarebytes found AMOS being distributed through a malware delivery chain known as \u201cClearFake.\u201d The ClearFake campaign tricks users into believing they\u2019re downloading an approved web browser update. That has frequently meant a lot of malicious prompts mimicking Google Chrome\u2019s branding and update language, but the more recent campaign imitated the default browser on Mac devices\u2014Safari.<\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"766\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/03\/Safari.webp\" alt=\"\" class=\"wp-image-105930\" style=\"width:1014px;height:auto\" \/><figcaption class=\"wp-element-caption\">A template is used that mimics the official Apple websites and webpages to convince users into downloading a Safari &#8220;update&#8221; that instead contains malware.<\/figcaption><\/figure>\n<p>As <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/11\/atomic-stealer-distributed-to-mac-users-via-fake-browser-updates\" target=\"_blank\" rel=\"noreferrer noopener\">Malwarebytes Labs wrote at the time<\/a>:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cThis may very well be the first time we see one of the main social engineering campaigns, previously reserved for Windows, branch out not only in terms of geolocation but also operating system.\u201d<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\" id=\"h-replace-magic-with-malwarebytes\"><strong>Replace \u201cmagic\u201d with Malwarebytes<\/strong><\/h2>\n<p>Cyberthreats on Mac aren\u2019t non-existent, they\u2019re just different. But different threats still need effective protection, which is where Malwarebytes Premium can help.<\/p>\n<p>Malwarebytes Premium detects and blocks the most common infostealers that target Macs\u2014including AMOS\u2014along with annoying browser hijackers and adware threats such as <a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/osx-genieo\" target=\"_blank\" rel=\"noreferrer noopener\">Genieo<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/osx-vsearch\" target=\"_blank\" rel=\"noreferrer noopener\">Vsearch<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/adware-crossrider\" target=\"_blank\" rel=\"noreferrer noopener\">Crossrider<\/a>, and more. Stay protected, proactively, with <a href=\"https:\/\/www.malwarebytes.com\/mac\">Malwarebytes Premium for Mac<\/a>. <\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/apple\/2024\/03\/no-apple-magic-as-11-of-macos-detections-last-year-came-from-malware\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Last year, 11% of all detections on Macs were caused by malware. The illuminating figure gives a view into the world of Mac cyberthreats.  <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30076,2211,30077,18223,30971,10454,19943,11976,32,30864,30972],"class_list":["post-24086","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-amos","tag-apple","tag-atomic-stealer","tag-crossrider","tag-genieo","tag-mac","tag-mac-adware","tag-mac-malware","tag-news","tag-state-of-malware-2024","tag-vsearch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24086"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24086\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24086"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}