Attackers have used a malicious Google ad with Homebrew’s proper “brew.sh” URL to redirect to the typosquatted “brewe[.]sh” site, which lures targets into downloading the package manager that enables infostealer malware execution, according to security researcher Ryan Chenkie.
Related Posts
Novel Earth Minotaur hackers’ surveillance operation uncovered
Attacks with an updated MOONSHINE exploit kit have been launched by newly emergent threat operation Earth Minotaur to compromise Windows…
5.6 million patients affected by Ascension Health cyberattack
Ascension Health on Dec. 19 started sending out letters to the 5.6 million patients who were affected by a ransomware…
Data breach compromises STIIIZY customers’ data
Information compromised in the breach included not only names, birthdates, email addresses, and phone numbers, but also Social Security numbers,…