Hackers Attacking macOS Users with Spoofed Homebrew Websites

Cybercriminals have escalated their attacks on macOS users by deploying spoofed Homebrew websites to distribute malicious software. Homebrew, a popular package manager for macOS, is widely trusted by developers and users for installing software. However, attackers have created counterfeit websites mimicking the official Homebrew site to trick users into downloading compromised installers. These fake sites host malware that can compromise user systems, steal sensitive data, and provide attackers with unauthorized access. The attack vector primarily involves phishing and social engineering tactics, where users are lured to these spoofed sites through deceptive links shared via emails, social media, or compromised websites. Once users download and run the malicious Homebrew installer, their macOS devices become vulnerable to a range of threats including data exfiltration, remote control, and persistence mechanisms that evade detection. Security experts advise macOS users to verify the authenticity of Homebrew sources by checking URLs carefully and using official channels for software installation. Additionally, enabling system security features such as Gatekeeper and XProtect, and maintaining up-to-date antivirus software can help mitigate risks. Organizations should educate their employees about these threats and implement network-level protections to block access to known malicious domains. This campaign highlights the growing trend of targeting macOS users, who were traditionally considered less vulnerable compared to other platforms. As attackers refine their tactics, vigilance and proactive security measures become essential to protect against these sophisticated supply chain and software distribution attacks. Users and administrators must stay informed about emerging threats and adopt best practices to safeguard their systems and data integrity.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 14 Oct 2025 05:40:14 +0000


Cyber News related to Hackers Attacking macOS Users with Spoofed Homebrew Websites

Hackers Attacking macOS Users with Spoofed Homebrew Websites - Cybercriminals have escalated their attacks on macOS users by deploying spoofed Homebrew websites to distribute malicious software. Homebrew, a popular package manager for macOS, is widely trusted by developers and users for installing software. ...
4 months ago Cybersecuritynews.com
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
3 years ago Hackread.com
Many popular websites still cling to password creation policies from 1985 - A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found. The researchers used an automated account creation method to assess over 20,000 ...
2 years ago Helpnetsecurity.com
Microsoft: BlueNoroff hackers plan new crypto-theft attacks - Microsoft warns that the BlueNoroff North Korean hacking group is setting up new attack infrastructure for upcoming social engineering campaigns on LinkedIn. This financially motivated threat group also has a documented history of cryptocurrency ...
2 years ago Bleepingcomputer.com
Booking.com hackers increase attacks on customers - Hackers are increasing their attacks on Booking.com customers by posting adverts on dark web forums asking for help finding victims. Cyber-criminals are offering up to $2,000 for login details of hotels as they continue to target the people who are ...
2 years ago Bbc.com
Google Ads for fake Homebrew, LogMeIn sites push info-stealers - Cybercriminals are exploiting Google Ads to promote fake websites impersonating popular remote access tools like Homebrew and LogMeIn. These fraudulent sites are designed to distribute info-stealing malware, targeting users who seek legitimate ...
4 months ago Bleepingcomputer.com
Non-mobile malware statistics, Q1 2024 - More than 83,000 users experienced ransomware attacks, with 20% of all victims published on ransomware gangs' DLSs hit by LockBit. In Q1, Kaspersky solutions protected 83,270 unique users from ransomware Trojan attacks. Number of unique users ...
1 year ago Securelist.com LockBit
Stealthy New macOS Backdoor Hides on Chinese Websites - A sneaky macOS backdoor that allows attackers to remotely control infected machines has been hiding in trojanized applications for the platform that are hosted on Chinese websites. Researchers from Jamf Threat Labs discovered the series of poisoned ...
2 years ago Darkreading.com
Holiday Hackers: How to Safeguard Your Service Desk - Hackers really don't take holidays, but they will take advantage of them. Many of these cyberattacks will zero in on the service or help desk to gain entry into network systems. Recovering accounts because of forgotten passwords is one of the ...
2 years ago Bleepingcomputer.com
How Russian Hackers Attack Samsung Devices – A Comprehensive Guide - Samsung devices have become all the rage around the globe. Unfortunately, their popularity also attracts the attention of hackers and other cybercriminals who take advantage of them to spread their malicious codes and conduct their illegal ...
3 years ago Heimdalsecurity.com
Microsoft: Iranian hackers target researchers with new MediaPl malware - Microsoft says that a group of Iranian-backed state hackers are targeting high-profile employees of research organizations and universities across Europe and the United States in spearphishing attacks pushing new backdoor malware. The attackers, a ...
2 years ago Bleepingcomputer.com APT3 APT33
Hacker Conversations: Chris Evans, Hacker and CISO - Chris Evans is CISO and chief hacking officer at HackerOne. SecurityWeek's Hacker Conversations series seeks to understand the mind and motivations of hackers by talking to hackers. Evans challenges the common perception of both hackers and their ...
1 year ago Securityweek.com Silence
1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers - These attacks range from fake calls and phishing emails to malicious links and spoofed websites, all designed to trick shoppers into revealing sensitive account information or making fraudulent payments. During Amazon’s Big Spring Sale in March ...
8 months ago Cybersecuritynews.com
China-linked hackers spoof big-name brand websites to steal shoppers' payment info | The Record from Recorded Future News - The campaign, which has been active for months, uses thousands of phishing websites that mimic the design and product listings of well-known retailers — including Apple, PayPal, Nordstrom, Hermes, and Michael Kors — to trick users into entering ...
8 months ago Therecord.media
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
1 year ago Cybersecuritynews.com
Sophisticated macOS Infostealers Get Past Apple's Built-In Detection - Increasingly sophisticated infostealers are targeting macOS with the capability to evade Apple's built-in malware protection, as attackers are becoming more savvy about how to crack static signature-detection engines like the platform's proprietary ...
2 years ago Darkreading.com Hunters
macOS Gatekeeper Explained: Strengthening System Defenses - Apple’s macOS Gatekeeper, a cornerstone of the operating system’s defense against malicious software, has undergone significant macOS Sequoia (15.0) updates to address emerging security challenges. Developers submitting apps to Apple’s notary ...
9 months ago Cybersecuritynews.com
Pakistani Firm Shipped Fentanyl Analogs, Scams to US – Krebs on Security - California resident Walter Horsting discovered something similar when he sued 360 Digital Marketing in small claims court last year, after hiring a company called Vox Ghostwriting to help write, edit and promote a spy novel he’d been working ...
10 months ago Krebsonsecurity.com
SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols - A new attack technique named SMTP Smuggling can allow malicious actors to send out spoofed emails that bypass authentication mechanisms. SMTP Smuggling was discovered by Timo Longin, a researcher known for DNS attacks, in collaboration with SEC ...
2 years ago Securityweek.com
SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols - A new attack technique named SMTP Smuggling can allow malicious actors to send out spoofed emails that bypass authentication mechanisms. SMTP Smuggling was discovered by Timo Longin, a researcher known for DNS attacks, in collaboration with SEC ...
2 years ago Packetstormsecurity.com
Hackers Leverage Built-In macOS Protection to Evade Detection - Recent cybersecurity reports reveal that hackers are exploiting built-in macOS security features to bypass traditional detection methods. This sophisticated technique involves leveraging native macOS protections, such as System Integrity Protection ...
6 months ago Cybersecuritynews.com
Spoofed AI sidebars can trick Atlas Comet users into dangerous actions - A recent security concern has emerged involving spoofed AI sidebars targeting users of Atlas Comet, a popular AI-powered platform. Attackers are exploiting these fake sidebars to deceive users into performing risky actions that could compromise their ...
4 months ago Bleepingcomputer.com
The Unlikely Romance of Hackers and Government Suitors - The annual Hack the Capitol event brings together a diverse group of scientists, hackers, and policymakers to educate congressional staffers, scholars, and the press about the most critical cybersecurity challenges facing our nation. Hack the Capitol ...
2 years ago Darkreading.com
Why Have Big Cybersecurity Hacks Surged in 2023? - Payments made to hackers who hold systems hostage for ransom increased by almost half through September, according to blockchain analytics firm Chainalysis Inc., totaling almost $500 million in payouts. In just the past few months, hackers have ...
2 years ago Bloomberg.com LockBit
North Korean Hackers Use Fake Job Offers & Salary Bumps as Lure for Crypto Theft - Recent investigations have uncovered a massive operation carried out by North Korean hackers looking to steal cryptocurrency through fake job offers and salary bumps. According to recent reports, hackers have been able to trace the malicious ...
3 years ago Therecord.media