G2 Logo

Trouble Brewing - Dissecting a fake homebrew update that stole user data

By Oliver Simonnet, Lead Cyber Security Researcher at CultureAI

Table of contents

  • Preamble
  • Malvertising - Effective and on the rise
  • Looking at the install command
  • Reverse engineering the payload
  • Reversing the decoding function:
  • Reversing the decryption function
  • Decoding the second stage payload:
  • Conclusion
  • Indicators of Compromise (IoCs)
  • References
Oliver Simonnet avatar

Oliver Simonnet

Lead Security Researcher

10 March 20258 min read
Share:

Recommended for you

[object Object]

5 Themes From a Candid Discussion

Eskenzi's IT Analyst & CISO Forum wasn’t a typical vendor event. No polished decks. No rehearsed narratives. Just operat...

[object Object]

A Critical Look at OpenClaw and NemoClaw

Surprise, surprise, agentic AI is advancing very quickly, and security isn’t quite keeping up. While most attention in r...

[object Object]

Scattered Spider and DragonForce: A Case Study in Human-Centric Cyber Threats

In April 2025, large retailers were targeted by cyber attacks that caused disruption across their services. Although att...