Found a virus affecting macOS users
We are confident that we are read by users of a wide variety of operating systems. And macOS is no exception. This common system is used on hundreds of thousands of computers around the world. MacOS lovers are attracted by the high degree of security and isolation of the system. However, as you know, any, even the most advanced protection system can be circumvented. This was done by representatives of the hacker group OSAMiner. These attackers, according to SentinelOne, have been avoiding detection with their malware for over 5 years. Next, we will tell you everything that is known about this virus, as well as ways to protect yourself from dangerous software. So let’s get started.
How the virus developed
According to independent digital security experts, OSAMiner was voluntarily downloaded onto the computers of future victims. Hackers have found a way to disguise their brainchild as another program and interest the user in the long-term use of the solution. The choice fell on the popular League of Legends game and the Microsoft Office program. Which are known to be used on macOS too. This choice allowed the hackers to solve two problems at once: install the program on the computer to use and make sure that the virus will last a long time in the victim’s system. Thus, they managed to infect thousands of computers. After entering the system, the program began to take over the power of the equipment and direct the computing power to the extraction of digital currencies. The latter, of course, were credited to the scammers’ account. What enriched the creators of the virus.
What is the danger of the program on macOS
Note that the virus infect exactly macOS. The system has a more closed device, so malware is not as easy to detect as it is on Linux or Windows. The main manifestation of a dangerous program is a drop in the computing power oent undetected for 5 years. Experts have yet to find out how many computers the virus bypassed and how much the hackers were able to earn. Nevertheless, even now it is reliably known that the main influx of victims came from China and other Asian regions.
How to protect yourself from the virus?
At the moment, a detailed diagram of the device of the malicious program has been published. In fact, the hackers used a rather creative approach that allowed them to both profit and continue quiet, unnoticed work in the shadow of the victim’s computer. Having detected any unknown activity on your own device, we recommend that you immediately diagnose the system. For this, both paid and free programs can be used. Special services have long learned to identify hidden miners. Thus, it is enough to show the maximum vigilance to your own system to protect yourself from the destructive consequences of hidden mining. We also strongly recommend that you carefully check download links for programs. You should not follow links that come from unknown addresses to email or social networks. It is possible that a hacker is sitting on the other side of the monitor and is attacking your device.
Stay tuned and follow all the news of the crypto industry with us. We regularly publish only high-quality and interesting material. Thanks for attention. Good luck!