Tuesday, November 12, 2024
HomeAdwareBeware !! #1 Adware Removal Mac Store App "Adware Doctor" Spying &...

Beware !! #1 Adware Removal Mac Store App “Adware Doctor” Spying & Stealing Mac Users Sensitive Data

Published on

Malware protection

One of the Top paid Apple’s Mac store App “Adware Doctor” spying the Mac users and steal the Users browsers history from the Safari browser.

Apple always claimed that the safest place to download apps for your Mac is the “Mac App Store” but this malicious activities of the most famous paid app leads to rising a lot of question against the Apple Privacy statement.

Adware Doctor was supposed to scan Mac computers for malware and remove suspicious files and Adware Doctor claims to be the “best app” to remove a variety of common adware threats which target Mac users.

- Advertisement - SIEM as a Service

Adware Doctor is one of the Top rated App and it was listed in the official Apple Website which is sitting among the top 4 App.

This App listed under ” Top paid utilities” which could cost  $4.99 and the detailed analysis showed that this app is developed by Chinese application’s developer, “Yongming Zhang”

Apart from that, This app initially posed as Adware medic and its owned by Malwarebytes which leads to pullout but it came back to the store when it changes its name as  Adware Doctor.

Adware Doctor Stealing Sensitive User Data Operation

Many of the users reported to Apple regarding this unusual behavior but Apple doesn’t care much and one of the recent tweet state that, Top Sold MacOS AppStore application is ROGUE. Adware Doctor is stealing your privacy.

Above Tweet that posted along with POC demonstrate that Adware Doctor collecting and stealthily exfiltrating a variety of sensitive user data including browser history.

Researchers performed an in-depth analysis using process monitor and retrieve the zip utility file to create a password-protected archive history.zip that was being uploaded to the Chinese server.

Adware Doctor.44148  open ~/Library/Containers/com.yelab.Browser-Sweeper/Data/Library
/Application Support/com.yelab.Browser-Sweeper/history.zip
According to objective-see, By editing the system’s /etc/hosts file we can redirect this request to a server we control can capture what Adware Doctor is trying to upload. And what do you think that might be? If you guessed the history.zip file you would be correct.

Since its a password protected file, they unzip the archive, entering webtool as the password and extracted that confirmed that  Adware Doctor is stealing your browser history.

Finally, Apple just removed Adware Doctor, a paid utility in the Mac App Store and the users who all are already downloaded this is strictly advised to remove from your computer in order to prevent yourself and keep your better privacy.

Also Read:

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

60,000 Android Devices are Infected with Malicious Battery Saver App that Steals Various Sensitive Data

MyloBot – Highly Sophisticated Botnet Shutdown Windows Defender & Blocking Ports on the Firewall

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...

Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices

A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the...

Spyware App Found Running on Multiple US Hotel Check-In Computers

A consumer-grade spyware app named pcTattletale has been discovered running on the check-in systems...