Skip to content

BEWARE, active punycode attack on google ads homebrew install #866

@cipher-fox

Description

@cipher-fox

I just spotted a possible Punycode attack on Google when searching for the keywords "install homebrew".

The page seems to be legitimate https://www.brew.sh but then it redirects to https://hornebnew.com, where it downloads and mounts a DMG file, in which there is a Mach-o file that it later executes to infect the machine.

It may seem that everything went well, since in the end brew is installed on the machine.

This is the virustotal analysis of the infected file inside the DMG.
https://www.virustotal.com/gui/file/d4e86dbffd226e2aa5efeedd3159e4c72422238860939b370605ec1f07034f96/detection

Captura de pantalla 2024-07-11 a las 15 17 58
Captura de pantalla 2024-07-11 a las 15 20 30
Captura de pantalla 2024-07-11 a las 15 20 42

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions