![]() While most PUA detections are generic in nature, common names still crop up in Bitdefender’s telemetry.Īdware follows closely, at just over a fifth of threats targeting Mac computers. With a 25.3 per cent share, PUAs represent a quarter of ‘executable’ threats to Macs.Įven with Apple keeping close tabs on the ecosystem, developers have flooded the market with ‘shady’ apps, some persuasive enough to get users to disable restrictions and run apps from any source. Highly aggressive PUAs can modify third-party apps, download additional (unsolicited) software, and alter system settings. Some PUAs hijack the user’s browser, changing the default search engine and installing plugins without consent. Walking the thin line between nuisance and threat, PUAs are commonly found as freeware, repackaged applications or utility apps (i.e., system cleaners) with hidden functionality like data tracking and coin mining. PUAs occupy the second spot, with more than a quarter of detections. While some can be considered legacy malware, threat actors still use them, with some degree of success, as many users don’t configure proper security settings and/or deploy a dedicated security solution. Most Trojan families listed in the report are household names in the macOS threat landscape. Threat actors use every trick in the book to infect systems, including socially engineered communications (e.g., spam, phishing, social media) rigged advertisements (malvertising) and tainted file downloads via torrent or warez websites. Just like the years prior, Trojans remain the biggest single threat to Macs, accounting for more than half of the threats detected. While named differently, these hazards share one trait: they require victims to manually run the threat, meaning their authors try hard to make their malware look like legitimate applications.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |