Infected Through Your ISP #hacked #infected #infection #security #isp @3DGAMEMAN
3dGameMan T-Shirts: https://3dgameman.myspreadshop.com/all
Join our community: / 3dgameman
- Tip Jar: https://paypal.me/3dGameMan
- Channel Perks: / @3dgameman
- Thanks for liking, sharing, subscribing & hitting that notification bell :)
- Have a Question?: • Ask Me a Question
Other relevant links:
Twitter: / 3dgameman
Steam: https://steamcommunity.com/id/3dGameMan
TikTok: / 3dgameman
Article: https://arstechnica.com/security/2024...
Hackers launched a sophisticated attack that delivered malware to Windows and Mac users by compromising an internet service provider (ISP). They achieved this by:
Hijacking Network Infrastructure: Hackers gained control of the ISP's network infrastructure, allowing them to manipulate how users' devices accessed updates for various apps.
DNS Poisoning: They poisoned DNS responses, redirecting users to malicious servers instead of the legitimate update servers for targeted apps (e.g., 5KPlayer, Quick Heal, Rainmeter). This worked even with public DNS services like Google's 8.8.8.8.
Distributing Malware: By intercepting update requests, hackers delivered malware disguised as legitimate updates. These infected devices with MACMA for macOS or POCOSTICK for Windows.
How to Protect Yourself:
Avoid Unsecured Updates: Only use apps that deliver updates securely (using HTTPS and cryptographic signatures).
Consider DNS over HTTPS/TLS: These protocols help ensure DNS lookups haven't been tampered with.
Stay Informed: Keep up-to-date on security threats and software vulnerabilities.
The Takeaway:
This attack highlights the importance of secure update mechanisms and the potential dangers of compromised infrastructure. By staying informed and using secure practices, users can minimize the risk of falling victim to similar attacks.