Apple fans beware - Mac and iOS devices are facing more security threats than ever before
Hackers are targeting Apple devices with cryptominers
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
A new report has claimedmalwarethreats look to be on the rise on the macOS platform.
Cybersecurity researchers from Elastic Security Labs recently published findings which noted that of all the different types of malware that crooks could use to target Mac devices, cryptominers stand out as the most popular one.
The company’s report found Trojans are the most popular malware in the world, with a 75% global market share. Cryptominers and ransomware have rounded off the top three. The majority of these distributions - 54% - have targeted Linux devices. Windowsendpointsare second with a 39% market share. That leaves Macs with roughly 6%.
XMRig remains king of cryptominers
While somewhat trivial compared to Windows and Linux, macOS threats are rising. Most notably cryptominers, Elastic says: “It should be noted that the distribution and victimology of macOS cryptominers could become increasingly popular and developers leverage MacOS and JavaScript for work-related tasks,” the report says. “Since Node Package Manager (NPM) is a common package manager for JavaScript, cryptominers could be distributed in malicious packages to macOS endpoints.”
The most popular cryptominer, by far, is XMRig. It’s a known miner that’s used across platforms, and perhaps more interestingly - used both for legitimate and malicious purposes. That makes determining when it’s used maliciously notoriously difficult. That being said, XMRig is found in 40% of all cryptomining instances on macOS devices, Elastic has found.
Windows and Linux servers turned into crypto miners>This new Linux malware floods machines with cryptominers and DDoS bots>Check out the best ransomware protection services right now
Cryptominers are small executable files that use the device’s computing power to mine cryptocurrency, and then send it to the designated wallet address. Threat actors often target servers and other endpoints with remote code execution and distribute XMRig because mining cryptocurrency renders the device useless for anything else, and rakes up a hefty electricity bill.
Most of the time, cybercriminals would mine Monero (XMR), a privacy-oriented cryptocurrency that’s very hard to trace.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Via:9To5Mac
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
A new form of macOS malware is being used by devious North Korean hackers
Scammers are using fake copyright infringement claims to hack businesses
Belkin’s Travel Bag for Vision Pro has pockets and is way cheaper than Apple’s own case