Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Target macOS Users with Weaponized Meeting Software
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Target macOS Users with Weaponized Meeting Software

Highlights

  • Cybersecurity experts uncover a sophisticated attack on macOS users.

  • Vortax meeting software used to distribute potent malware.

  • Organizations urged to enhance security and user education.

Samantha Reed
Last updated: 20 June, 2024 - 10:16 am 10:16 am
Samantha Reed 11 months ago
Share
SHARE

Cybersecurity experts have detected a sophisticated campaign targeting macOS users, orchestrated by a threat actor identified as “markopolo.” This campaign utilizes Vortax, a seemingly legitimate virtual meeting software, as a delivery mechanism for potent malware. The malicious campaign aims to compromise the security of cryptocurrency users and exploit vulnerabilities in macOS systems. Further details about the malware involved can be found on Recorded Future’s official blog.

Contents
Weaponized Meeting SoftwareMitigations

Weaponized Meeting Software

The Insikt group from Recorded Future has flagged a prolonged attack on macOS users, specifically targeting cryptocurrency enthusiasts. The Vortax application, which serves as a medium for three significant infostealers—Rhadamanthys, Stealc, and Atomic macOS Stealer (AMOS)—is at the heart of this campaign. These infostealers are designed to extract sensitive information, posing a severe threat to user privacy and security.

The malware is predominantly distributed through social media platforms, where it is promoted as legitimate meeting software. Users are tricked into downloading the malware via phishing links and direct messages containing unique “Room IDs.” These Room IDs, when entered on the Vortax website, redirect users to malicious download links. This method has proven effective in compromising numerous systems.

Mitigations

Recorded Future’s analysis of the Vortax installers for both Windows and macOS indicates that the application delivers Rhadamanthys and Stealc, or AMOS, respectively. This large-scale credential harvesting operation suggests that the threat actor, markopolo, could be functioning as an initial access broker or a dark web log vendor. This highlights the increasing need for improved security measures to protect against such sophisticated attacks.

Organizations must enhance their security posture by deploying advanced monitoring and mitigation strategies. Regular updates to AMOS detection systems are essential to prevent infections. User education on the risks associated with downloading unapproved software, especially from social media, is also crucial. Implementing strict security controls and encouraging the reporting of suspicious activities can further bolster defenses against these threats.

Historical campaigns linked to markopolo have targeted Web3 gaming projects, utilizing shared hosting and command-and-control (C2) infrastructure. This recurring pattern underscores the adaptability and persistence of this threat actor. The current campaign’s focus on macOS users, particularly those involved in cryptocurrency, indicates a strategic shift to exploit lucrative and vulnerable targets.

Comparatively, past attacks by markopolo have not exhibited the same level of sophistication or targeted approach as the current Vortax campaign. The integration of multiple infostealers and the use of social media for distribution demonstrate an evolution in tactics. This indicates a growing threat landscape that demands continuous vigilance and adaptive security measures.

Organizations must leverage robust intelligence and monitoring systems to detect and mitigate macOS malware threats effectively. Custom watchlists can enhance visibility into infostealer activities, while proper credentials and brand monitoring provide insights into compromised data. By adopting these measures, organizations can better protect their digital ecosystems from evolving cyber threats.

For more information, visit: Recorded Future’s official blog.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Microsoft Tackles 72 Vulnerabilities in May Security Update

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Discover Top Weather Apps for Your iPhone
Next Article Microconfined Assembly Enhances Liquid Metal Electrodes for Wearable Electronics

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Capcom Reports Record Profits with Monster Hunter Leading Sales
Gaming
Elon Musk Expands Starlink in Saudi Arabia for Maritime and Aviation
Electric Vehicle Technology
Tesla’s FSD Reacts Swiftly to Avoid Semi-Truck Collision
Electric Vehicle
Tesla Brings Robotaxi to Saudi Arabia as Global Expansion Continues
Electric Vehicle
Tesla Constructs Cortex 2.0 at Giga Texas to Boost Computing Power
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?