ValleyRAT malware spread via bogus software installers

Share This Post

[ad_1]

Attackers have used a malicious Google ad with Homebrew’s proper “brew.sh” URL to redirect to the typosquatted “brewe[.]sh” site, which lures targets into downloading the package manager that enables infostealer malware execution, according to security researcher Ryan Chenkie.

[ad_2]

Source link

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Do You Want To Boost Your Business?

drop us a line and keep in touch