G2 Logo

Trouble Brewing - Dissecting a fake homebrew update that stole user data

By Oliver Simonnet, Lead Cyber Security Researcher at CultureAI

Table of contents

  • Preamble
  • Malvertising - Effective and on the rise
  • Looking at the install command
  • Reverse engineering the payload
  • Reversing the decoding function:
  • Reversing the decryption function
  • Decoding the second stage payload:
  • Conclusion
  • Indicators of Compromise (IoCs)
  • References
Oliver Simonnet avatar

Oliver Simonnet

Lead Security Researcher

10 March 20258 min read
Share:

Recommended for you

[object Object]

The Rise of AI Abuse:A story of Criminal GPTs, DeepFakes, Data Breaches, AI Malware, and Agentic Sleeper Agents

This post explores how attackers have been adopting AI technologies, how it’s reshaped the cyber threat landscape, and w...

[object Object]

AI 2026: A Look Ahead

2026, the perfect time to reflect on how far technology has come and what lies ahead. Without a doubt, Artificial intell...

[object Object]

The AI Control Gap: Why Partners Are Now on the Front Line

Partners who move early can shape how customers think about AI governance, risk, and control. Those who wait will be bro...