Attackers have used a malicious Google ad with Homebrew’s proper “brew.sh” URL to redirect to the typosquatted “brewe[.]sh” site, which lures targets into downloading the package manager that enables infostealer malware execution, according to security researcher Ryan Chenkie.
Related Posts
NPM package poses as legit Ethereum smart contract, injects Quasar RAT
A malicious npm package has been posing as a tool for detecting bugs in Ethereum smart contracts, but instead deploys…
Chemonics discloses months-long breach affecting 263K people
Chemonics International, an international development company and major contractor for the United States Agency for International Development (USAID), disclosed a…
RansomHub attack compromises Bologna FC data
In a filing with the Office of the Maine Attorney General, OPPC disclosed that infiltration of its systems resulted in…