G2 Logo

Trouble Brewing - Dissecting a fake homebrew update that stole user data

By Oliver Simonnet, Lead Cyber Security Researcher at CultureAI

Table of contents

  • Preamble
  • Malvertising - Effective and on the rise
  • Looking at the install command
  • Reverse engineering the payload
  • Reversing the decoding function:
  • Reversing the decryption function
  • Decoding the second stage payload:
  • Conclusion
  • Indicators of Compromise (IoCs)
  • References
10 March 20258 min read
Share:

Recommended for you

[object Object]

A story of Criminal GPTs, DeepFakes, Data Breaches, AI Malware, and Agentic Sleeper Agents

This post explores how attackers have been adopting AI technologies, how it’s reshaped the cyber threat landscape, and w...

[object Object]

Case Study: How an International Law Firm Prevented 98% of High-Risk GenAI Submissions Without Locking Down Innovation

Discover how a leading international law firm secured generative AI (GenAI) usage without sacrificing productivity. Faci...

[object Object]

The Evolution of AI: From Symbolic Reasoning to GPTs and Agentic Systems

It seems like Artificial Intelligence (AI) has suddenly appeared in everything, everywhere, all at once. What feels like...