







{"id":17438,"date":"2024-09-10T04:24:36","date_gmt":"2024-09-10T04:24:36","guid":{"rendered":"https:\/\/cissar.com\/?p=17438"},"modified":"2024-09-10T04:24:36","modified_gmt":"2024-09-10T04:24:36","slug":"this-sneaky-malware-is-after-your-passwords-and-personal-data","status":"publish","type":"post","link":"https:\/\/cissar.com\/index.php\/2024\/09\/10\/this-sneaky-malware-is-after-your-passwords-and-personal-data\/","title":{"rendered":"This sneaky malware is after your passwords and personal data"},"content":{"rendered":"<div class=\"article-body\">\n<div class=\"featured featured-video video-ct\" data-v-543741ec=\"\">\n<div class=\"contain\" data-v-543741ec=\"\">\n<div class=\"control\" data-v-543741ec=\"\"><a href=\"#\" class=\"top\" data-v-543741ec=\"\"><\/a> <a href=\"#\" class=\"close\" data-v-543741ec=\"\">close<\/a><\/div>\n<div class=\"video-container\" data-v-543741ec=\"\">\n<div data-video-tags=\"on_air,on_air|cavuto_live,personality,personality|madison_scarpino,primary_us,us,tech|topics\" data-video-title=\"It could take weeks to recover from global tech outage: Cybersecurity experts\" data-video-id=\"6358658439112\" data-video-domain=\"foxnews\" data-video-type=\"CLIP\" data-widget-type=\"embed\" class=\"m video-player\" data-v-543741ec=\"\"><a href=\"https:\/\/www.foxnews.com\/video\/6358658439112\" data-v-543741ec=\"\"><picture data-v-543741ec=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/288\/162\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/576\/324\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(max-width: 767px)\" data-v-543741ec=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/672\/378\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/1344\/756\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 768px) and (max-width: 1023px)\" data-v-543741ec=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/676\/380\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/1352\/760\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 1024px) and (max-width: 1279px)\" data-v-543741ec=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/896\/500\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/1792\/1000\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 1280px)\" data-v-543741ec=\"\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/878f8ddf-1b5e-40c1-9fbb-ba2d4647d02d\/244690ee-fa9c-41fa-adb5-8473b3bb71fa\/1280x720\/match\/896\/500\/image.jpg?ve=1&#038;tl=1\" alt=\"It could take weeks to recover from global tech outage: Cybersecurity experts\" width=\"896\" height=\"500\" data-v-543741ec=\"\"><\/source><\/source><\/source><\/source><\/picture> <span class=\"overlay\" data-v-543741ec=\"\">Video<\/span><\/a><\/div>\n<\/div>\n<div class=\"info\" data-v-543741ec=\"\">\n<div class=\"caption\" data-v-543741ec=\"\">\n<h4 class=\"title\" data-v-543741ec=\"\"><a href=\"https:\/\/www.foxnews.com\/video\/6358658439112\" data-v-543741ec=\"\">It could take weeks to recover from global tech outage: Cybersecurity experts<\/a><\/h4>\n<p data-v-543741ec=\"\">Fox News\u2019 Madison Scarpino reports on the latest in a major global tech outage.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"speakable\">Apple Macs have historically been targeted less by hackers than Windows devices, but this trend is shifting. In recent months, there has been an increase in malware specifically <a href=\"https:\/\/www.foxnews.com\/category\/tech\/companies\/apple\" target=\"_blank\" rel=\"noopener\">targeting macOS<\/a> while leaving Windows systems unaffected.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb2\" id=\"tablet-tw-ad-lb2\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban1\" id=\"mobile-mw-ad-ban1\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p class=\"speakable\">Security researchers uncovered a new threat called &#8220;Cthulhu Stealer,&#8221; which has emerged, impersonating popular apps to harvest passwords and steal data from macOS users.<\/p>\n<p>The perception of Macs being inherently more secure is evolving as <a href=\"https:\/\/www.foxnews.com\/category\/tech\/topics\/cybercrime\" target=\"_blank\" rel=\"noopener\">cybercriminals increasingly develop<\/a> malware for Apple&#8217;s operating system. While Macs still face fewer overall threats compared to Windows PCs, the gap is narrowing.<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb2\" id=\"desktop-desk-ad-lb2\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/cyberguy.com\/newsletter\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>GET SECURITY ALERTS, EXPERT TIPS \u2013 SIGN UP FOR KURT\u2019S NEWSLETTER \u2013 THE CYBERGUY REPORT HERE<\/u><\/strong><\/a><\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/343\/192\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/686\/384\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/672\/378\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1344\/756\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/931\/523\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1862\/1046\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/720\/405\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1440\/810\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1200\/675\/1-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-intro.jpg?ve=1&#038;tl=1\" alt=\"man on mac\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A man working on his Mac \u00a0<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h2><strong>How this \u2018malware-as-a-service\u2019 targets your Mac<\/strong><\/h2>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban2\" id=\"mobile-mw-ad-ban2\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Cthulhu Stealer malware has been available under a malware-as-a-service (MaaS) model for $500 a month since late 2023, <a href=\"https:\/\/www.cadosecurity.com\/blog\/from-the-depths-analyzing-the-cthulhu-stealer-malware-for-macos\" target=\"_blank\" rel=\"nofollow noopener\"><u>Cado Security<\/u><\/a> discovered.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb3\" id=\"tablet-tw-ad-lb3\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>&#8220;Cthulhu Stealer is an Apple disk image (DMG) that is bundled with two binaries, depending on the architecture,&#8221; Cado Security researcher Tara Gould said. &#8220;The malware is written in Golang and disguises itself as legitimate software.&#8221;<\/p>\n<p>The malware pretends to be legitimate software, <a href=\"https:\/\/www.foxnews.com\/tech\" target=\"_blank\" rel=\"noopener\">mimicking programs like CleanMyMac<\/a>, Grand Theft Auto IV and Adobe GenP. Adobe GenP, in particular, is an open-source tool used to bypass Adobe\u2019s Creative Cloud service and activate apps without paying.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban3\" id=\"mobile-mw-ad-ban3\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Once you install the malware disguised as a legit app and try to open it, macOS will warn you that it isn&#8217;t reliable. Ignoring the warning and continuing will prompt you to enter your password. After that, you&#8217;ll see a second prompt asking for your MetaMask password. The malware then creates a directory in \u2018\/Users\/Shared\/NW\u2019 and stores the credentials in text files. Chainbreak is used to dump Keychain passwords, which are saved in a file called Keychain.txt.<\/p>\n<p>With the required permissions in place, Cthulhu Stealer can grab a wide range of sensitive data, including saved passwords from iCloud Keychain, web browser cookies and even Telegram account details.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb4\" id=\"tablet-tw-ad-lb4\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>&#8220;The main functionality of Cthulhu Stealer is to steal credentials and cryptocurrency wallets from various stores, including game accounts,&#8221; Gould explained.<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/343\/192\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/686\/384\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/672\/378\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1344\/756\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/931\/523\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1862\/1046\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/720\/405\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1440\/810\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1200\/675\/2-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-copy.jpg?ve=1&#038;tl=1\" alt=\"woman with a mac\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A woman working on two Macs\u00a0<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb3\" id=\"desktop-desk-ad-lb3\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban4\" id=\"mobile-mw-ad-ban4\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/cyberguy.com\/privacy\/4-3-million-americans-exposed-in-massive-health-savings-account-data-breach\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH<\/u><\/strong><\/a><\/p>\n<h2><strong>Hackers are preying on Mac users<\/strong><\/h2>\n<p>There has been an increase in malware and vulnerabilities affecting Mac users. Recently, researchers at Cisco Talos discovered a <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/microsoft-apps-on-macos-could-be-your-biggest-privacy-threat\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>vulnerability in Microsoft apps<\/u><\/a> that could allow hackers to steal all your data and gain control of your system.<\/p>\n<p>Plus, a stealer malware called <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/new-russian-threat-targets-over-100-apple-macos-browser-extensions\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Banshee is targeting over 100 browsers on Mac devices<\/u><\/a> to steal passwords, cryptocurrency and personal data. These threats are in addition to the numerous data breaches we&#8217;ve seen throughout the year. This should act as a reminder that you need to take your cybersecurity seriously.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb5\" id=\"tablet-tw-ad-lb5\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban5\" id=\"mobile-mw-ad-ban5\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.foxnews.com\/tech\/what-is-ai-artificial-intelligence\" target=\"_blank\" rel=\"noopener\"><strong>WHAT IS ARTIFICIAL INTELLIGENCE (AI)?<\/strong><\/a><\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/343\/192\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/686\/384\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/672\/378\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1344\/756\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/931\/523\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1862\/1046\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/720\/405\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1440\/810\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/08\/1200\/675\/3-Beware-Mac-users-This-sneaky-malware-is-after-your-passwords-and-personal-data-outro.jpg?ve=1&#038;tl=1\" alt=\"woman typing on laptop\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A woman works on a laptop<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/cyberguy.com\/news\/massive-security-flaw-puts-most-popular-browsers-at-risk-on-mac\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC<\/u><\/strong><\/a><\/p>\n<h2><strong>5 tips to protect yourself from Mac malware<\/strong><\/h2>\n<p>Follow these essential tips to safeguard your Mac from the latest malware threats, including the notorious Cthulhu Stealer.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban6\" id=\"mobile-mw-ad-ban6\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>1.<strong> Have strong antivirus software: <\/strong>The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.<a href=\"https:\/\/cyberguy.com\/TotalAV\"><u> <\/u><\/a><a href=\"https:\/\/cyberguy.com\/security\/best-antivirus-protection\/\" target=\"_blank\" rel=\"nofollow noopener\">Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices<\/a>.<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb4\" id=\"desktop-desk-ad-lb4\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb6\" id=\"tablet-tw-ad-lb6\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.foxbusiness.com\/apps-products\" target=\"_blank\" rel=\"noopener\"><strong>GET FOX BUSINESS ON THE GO BY CLICKING HERE<\/strong><\/a><\/p>\n<p>2. <strong>Be cautious with downloads and links:<\/strong> Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban7\" id=\"mobile-mw-ad-ban7\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>3. <strong>Keep your software updated<\/strong>: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my <a href=\"https:\/\/cyberguy.com\/security\/how-to-update-your-devices\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>guide on keeping all your devices updated<\/u><\/a>.<\/p>\n<p>4. <strong>Use strong and unique passwords: <\/strong>To protect your Mac from malware, it\u2019s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/best-password-managers\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>password manager<\/u><\/a> can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb7\" id=\"tablet-tw-ad-lb7\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don\u2019t have to remember them yourself. By reducing the number of passwords you need to recall, you\u2019re less likely to reuse them, which lowers the risk of security breaches. Get more details about my <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/best-password-managers\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>best expert-reviewed Password Managers of 2024 here.<\/u><\/a><\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban8\" id=\"mobile-mw-ad-ban8\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>5. <strong>Use Two-Factor Authentication (2FA):<\/strong> Enable 2FA for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.<\/p>\n<p><a href=\"https:\/\/cyberguy.com\/privacy\/best-services-for-removing-your-personal-information-from-the-internet\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET<\/u><\/strong><\/a><\/p>\n<h2><strong>Kurt\u2019s key takeaway<\/strong><\/h2>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb5\" id=\"desktop-desk-ad-lb5\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Macs aren&#8217;t as safe from hackers as they used to be. With malware like Cthulhu Stealer and Banshee targeting Mac users, it&#8217;s a good reminder to step up your cybersecurity game. These threats can steal your passwords, data and even cryptocurrency, so investing in solid antivirus software and being cautious with what you download is more important than ever.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb8\" id=\"tablet-tw-ad-lb8\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban9\" id=\"mobile-mw-ad-ban9\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>When downloading new software, how do you determine if it\u2019s safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us at<strong> <\/strong><a href=\"http:\/\/cyberguy.com\/Contact\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>Cyberguy.com\/Contact<\/u><\/strong><\/a><\/p>\n<p><a href=\"https:\/\/foxnews.onelink.me\/xLDS?pid=AppArticleLink&#038;af_dp=foxnewsaf%3A%2F%2F&#038;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products\" target=\"_blank\" rel=\"noopener\"><strong><u>CLICK HERE TO GET THE FOX NEWS APP<\/u><\/strong><\/a><\/p>\n<p>For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to <a href=\"http:\/\/cyberguy.com\/Newsletter\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>Cyberguy.com\/Newsletter<\/u><\/strong><\/a><\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban10\" id=\"mobile-mw-ad-ban10\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/cyberguy.com\/contact\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Ask Kurt a question or let us know what stories you&#8217;d like us to cover<\/u><\/a><\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb9\" id=\"tablet-tw-ad-lb9\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Follow Kurt on his social channels<\/p>\n<ul>\n<li><a href=\"https:\/\/www.facebook.com\/CyberGuyOfficial\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Facebook<\/u><\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/c\/KurttheCyberGuy?sub_confirmation=1\" target=\"_blank\" rel=\"nofollow noopener\"><u>YouTube<\/u><\/a><\/li>\n<li><a href=\"https:\/\/www.instagram.com\/kurtthecyberguy\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Instagram<\/u><\/a><\/li>\n<\/ul>\n<p>\u00a0Answers to the most asked CyberGuy questions:<\/p>\n<ul>\n<li><a href=\"https:\/\/cyberguy.com\/software\/best-antivirus-protection\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/privacy\/best-vpns\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>What is the best way to stay private, secure and anonymous while browsing the web?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/how-to\/how-to-get-rid-of-robocalls-with-apps-and-data-removal-services\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>How can I get rid of robocalls with apps and data removal services?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/privacy\/best-services-for-removing-your-personal-information-from-the-internet\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>How do I remove my private data from the internet?<\/u><\/a><\/li>\n<\/ul>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb6\" id=\"desktop-desk-ad-lb6\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban11\" id=\"mobile-mw-ad-ban11\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>New from Kurt:<\/p>\n<ul>\n<li><a href=\"https:\/\/cyberguy.com\/Games_FA\" target=\"_blank\" rel=\"nofollow noopener\"><u>Try CyberGuy&#8217;s new games (crosswords, word searches, trivia and more!)<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/kurts-picks\/best-labor-day-sales\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Get Kurt\u2019s Labor Day deals<\/u><\/a><\/li>\n<\/ul>\n<p>Copyright 2024 CyberGuy.com.\u00a0 All rights reserved.<\/p>\n<div class=\"article-meta\">\n<div class=\"author-bio\">\n<p>Kurt &#8220;CyberGuy&#8221; Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News &#038; FOX Business beginning mornings on &#8220;FOX &#038; Friends.&#8221; Got a tech question? Get Kurt\u2019s free CyberGuy Newsletter, share your voice, a story idea or comment at <a href=\"https:\/\/cyberguy.com\/Newsletter\/\" target=\"_blank\" rel=\"nofollow noopener\">CyberGuy.com.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>close Video It could take weeks to recover from global tech outage: Cybersecurity experts Fox News\u2019 Madison Scarpino reports on the latest in a major global tech outage. Apple Macs have historically been targeted less by hackers than Windows devices, but this trend is shifting. In recent months, there has been an increase in malware [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17439,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,9],"tags":[],"class_list":["post-17438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tech"],"_links":{"self":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/comments?post=17438"}],"version-history":[{"count":1,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17438\/revisions"}],"predecessor-version":[{"id":17688,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17438\/revisions\/17688"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/media\/17439"}],"wp:attachment":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/media?parent=17438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/categories?post=17438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/tags?post=17438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}