G2 Logo

Trouble Brewing - Dissecting a fake homebrew update that stole user data

By Oliver Simonnet, Lead Cyber Security Researcher at CultureAI

Table of contents

  • Preamble
  • Malvertising - Effective and on the rise
  • Looking at the install command
  • Reverse engineering the payload
  • Reversing the decoding function:
  • Reversing the decryption function
  • Decoding the second stage payload:
  • Conclusion
  • Indicators of Compromise (IoCs)
  • References
Oliver Simonnet avatar

Oliver Simonnet

Lead Security Researcher

10 March 20258 min read
Share:

Recommended for you

[object Object]

Microsoft Marketplace: CultureAI Now Available

Microsoft’s Agentic Launchpad, in collaboration with NVIDIA and WeTransact, reflects that shift. It brings together a gr...

[object Object]

You're Not My Supervisor! Researching My Own New Starter Scam

Within weeks of stepping into a new role, I found myself receiving multiple phishing emails impersonating our CEO. Rathe...

[object Object]

The Rise of AI Abuse:A story of Criminal GPTs, DeepFakes, Data Breaches, AI Malware, and Agentic Sleeper Agents

This post explores how attackers have been adopting AI technologies, how it’s reshaped the cyber threat landscape, and w...