Mac Malware Becomes More Common – Are You A Victim?

February 17, 2020
Behind the fancy interface and icons, the MacOS operating system which powers Apple computers is significantly different to alternatives like Microsoft Windows. The system has been built from the ground up to increase security and protect users.

This design has been incredibly successful, allowing Apple to create the impression that iMacs and MacBooks are invulnerable, that hackers cannot break into their machines. However, iMacs and MacBooks are only as secure as the person using it and it is still quite common for people to leave their Mac unprotected by not installing anti-malware software.

But as Mac computers have become more popular, cyber criminals are devoting more time and attention to developing malware to target them. And many people are simply unaware of the risks they face.

Introducing the Shlayer trojan

Most will never have heard of the Shlayer trojan for instance – despite the fact that it has been attacking Mac computers since 2018. Researchers believe that around 10% of all Macs – millions of computers – have been targeted by the malware over the last two years.

The trojan spreads using website pop-ups, usually advising users to download an Adobe Flash Player update to access video content. The malware installer walks the victim through the process of installing the application before downloading additional malicious content itself.

Once installed, Shlayer hijacks the Safari browser to display targeted ads as the user surfs the web. The scammers are paid by advertising networks for every ad – a scam that may be worth millions of pounds every year.

This may not be the most damaging form of malware – but it’s very, very annoying. It also defrauds the companies paying for ads.

A warning for Mac users

Shlayer tells us two things. First, Apple computers can be – and are – infected with malware. There are security weaknesses in the operating system and cybercriminals are exploiting them.

Second, although Shlayer is relatively harmless, other hackers will inevitably use the same techniques for more malicious activities. Expect to see Mac malware becoming more dangerous, stealing passwords and identities and sensitive data.

Time to protect yourself

While Shlayer has been quietly infecting machines since 2018, tools to protect Apple computers have been in existence for much longer. Take The Protection Plan for Mac for instance, which provides comprehensive defence against malware and all types of computer viruses.

As with any anti-malware toolkit, our Protection Plan works best when installed before infection. The good news it’s not too late – we can still detect and remove Shlayer infections from your computer.

We fully expect to see new examples of Mac malware appearing in the near future – so it’s time to protect yourself now. 

Defend your business with The Protection Plan. Book a Free Cyber Clinic Today.
Book a Free Cyber Clinic

Follow Us

Be the first to know

You might also like

October 14, 2024
DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. According to a recent survey, almost 80% of CIOs expressed concerns about the difficulty of discerning trusted elements from untrusted ones within DevOps environments. In particular, the pressure to deliver services at a faster pace sometimes prompts DevOps teams to take security shortcuts, resulting in potentially costly repercussions. These include data breaches, application downtime, and compliance violations.  So, how can you strike a balance between the demand for agile DevOps practices and the need to maintain robust security measures?
October 4, 2024
Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs. Applications fuel the engine of the world’s economy, but enterprises can encounter substantial hurdles when striving to retain a competitive advantage in a rapidly changing digital landscape. Businesses must continuously pursue inventive solutions, even as they contend with sophisticated adversaries looking to exploit opportunities to disrupt operations, compromise vital information, and inflict harm. According to recent research, approximately 17% of cyberattacks aim to exploit vulnerable web applications. Yet, 98% of web applications are susceptible to attacks that can lead to malware infection or redirect users to malicious websites. All the while, 72% of these vulnerabilities result from coding errors. Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs.  This is because DAST tools operate without access to the application’s source code. Instead, they emulate genuine attacks, akin to those carried out by real hackers, to identify security weaknesses. This “black box” testing method examines the application from an external perspective, scrutinises its runtime behaviour, and observes how it reacts to simulated attacks. These simulations help evaluate whether the application exhibits vulnerabilities and if it is potentially susceptible to malicious attacks.
September 25, 2024
In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today. Hacking is attacking and breaking into computer systems illegally… isn’t it? The meaning of the term “hacking” has in fact changed substantially over time, morphing from describing essentially benign (or at worst mildly disruptive) activities into its modern attribution to largely criminal and illegal activities. What’s more, in its original usage, “hacking” doesn’t necessarily even need to involve computer systems at all.  In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today.
More Posts
Share by: