The ne’er-do-wells crafting various types of malicious code for Mac OS X came up with a new hoax. Users are being infected with the Amazonaws virus on a large scale lately. This malady redirects web traffic and displays popups with fake warnings and error messages in browsers. The idea is to dupe people into contacting supposed Mac technicians over a toll-free helpline, at which stage the social engineering part of the stratagem comes into play.
When confronted with adware, Mac users experience various web browsing issues and interferences. For instance, these offending apps may force browsers to return sites that victims never intended to visit. The sample called Slick Savings, however, does a different thing – it injects a bevy of intrusive advertisements into web pages accessed via Safari and the Mac editions of Chrome and Firefox. To top it off, this infection also harvests the user’s sensitive online information.
People don’t generally attach importance to the onset of obviously redundant advertisements during web browsing sessions, because such a state of things tends to be perceived as the norm these days. However, sometimes ads indicate a security problem that radiates from within a specific Mac machine. Ads by Taboola, for instance, typically won’t appear inside browser tabs unless the affiliated adware applet is running in the background. This guide is intended to help the infected Mac users get rid of Taboola ads for good.
From a technical viewpoint, it isn’t difficult to hijack a web browser regardless of the operating system it’s running on. It suffices attackers to force-install an application that intrusively puts certain browsing defaults into effect and doesn’t respond to the infected user’s manual troubleshooting attempts. This is exactly what happens as far as the ChumSearch contamination incidents are concerned.
The Mac OS X environment is now officially exposed to ransomware attacks. This breaking news began circulating on security resources as of March 4. A strain of malware dubbed KeRanger, alias OSX.KeRanger.A, is specifically targeting Mac machines, using a compromised version of a popular BitTorrent Client tailored for this platform. As a result, the victims’ files get encrypted and the extortionists demand a ransom for data recovery.
As the time goes by, it becomes more and more evident that Mac OS X is no longer that much of a moving target for cybercriminals. To its credit, however, this platform still boasts the defenses that keep malware from reaching a level of ubiquity. The main vector of compromise when it comes to Macs is the web browsing environment since it’s currently the least protected piece that’s not entirely controlled by Apple. The makers of infections like Search Genius take advantage of this status quo to the fullest.