
More specifically, Adload leverages a Person-in-The-Middle (PiTM) attack by installing a web proxy to hijack search engine results and inject advertisements into webpages, thereby siphoning ad revenue from official website holders to the adware operators.Īdload is also an unusually persistent strain of adware. Once adware is installed, it uses ad injection software and techniques to intercept a device’s online communications and redirect users’ traffic through the adware operators’ servers, injecting advertisements and promotions into webpages and search results. Besides the data sent to the attacker server, the app also sends “heartbeats” that let attackers know if the malware is still running. Over time, Microsoft said on Wednesday, UpdateAgent has grown increasingly advanced. Its methods of persistence-that is, the ability to run each time a Mac boots-were also fairly rudimentary. It collected product names, version numbers, and other basic system information. The UpdateAgent malware family began circulating no later than November or December 2020 as a relatively basic information-stealer. The additions include the pushing of an aggressive second-stage adware payload that installs a persistent backdoor on infected Macs.


Mac malware known as UpdateAgent has been spreading for more than a year, and it is growing increasingly malevolent as its developers add new bells and whistles.
