G2 Logo

Trouble Brewing - Dissecting a fake homebrew update that stole user data

By Oliver Simonnet, Lead Cyber Security Researcher at CultureAI

Table of contents

  • Preamble
  • Malvertising - Effective and on the rise
  • Looking at the install command
  • Reverse engineering the payload
  • Reversing the decoding function:
  • Reversing the decryption function
  • Decoding the second stage payload:
  • Conclusion
  • Indicators of Compromise (IoCs)
  • References
Oliver Simonnet avatar

Oliver Simonnet

Lead Security Researcher

10 March 20258 min read
Share:

Recommended for you

[object Object]

 But Control Over Data and IP Is Still Catching Up

Manufacturing is entering a phase where AI is no longer optional, but neither is control. The organisations that succeed...

[object Object]

Case Study: How a Digital Bank Reduced Shadow AI Risk by 80% — Without Blocking Innovation

See how a high-growth digital bank protected sensitive data while enabling safe GenAI adoption across the enterprise. Fa...

[object Object]

Empowering Safe GenAI Adoption at a 3,600-Employee Fintech

Learn how a global fintech company stopped over 20 sensitive data leaks to GenAI tools daily—without blocking innovation...