Navigation
Search
|
Fake Homebrew Google Ads Push Malware Onto macOS
Wednesday October 22, 2025. 03:00 AM , from Slashdot/Apple
![]() When checking some of the domains, BleepingComputer discovered that in some cases the traffic to the sites was driven via Google Ads, indicating that the threat actor promoted them to appear in Google Search results. The malicious sites feature convincing download portals for the fake apps and instruct users to copy a curl command in their Terminal to install them, the researchers say. In other cases, like for TradingView, the malicious commands are presented as a 'connection security confirmation step.' However, if the user clicks on the 'copy' button, a base64-encoded installation command is delivered to the clipboard instead of the displayed Cloudflare verification ID. Read more of this story at Slashdot.
https://it.slashdot.org/story/25/10/21/2256241/fake-homebrew-google-ads-push-malware-onto-macos?utm_...
Related News |
46 sources
Current Date
Oct, Wed 22 - 14:54 CEST
|