G2 Logo

Trouble Brewing - Dissecting a fake homebrew update that stole user data

By Oliver Simonnet, Lead Cyber Security Researcher at CultureAI

Table of contents

  • Preamble
  • Malvertising - Effective and on the rise
  • Looking at the install command
  • Reverse engineering the payload
  • Reversing the decoding function:
  • Reversing the decryption function
  • Decoding the second stage payload:
  • Conclusion
  • Indicators of Compromise (IoCs)
  • References
Oliver Simonnet avatar

Oliver Simonnet

Lead Security Researcher

10 March 20258 min read
Share:

Recommended for you

[object Object]

A January Snapshot: Real-World AI Usage

This snapshot from CultureAI’s January usage data highlights how AI is actually being used across everyday workflows, an...

[object Object]

CultureAI named among six UK cyber scaleups chosen for the Cyber Runway Scale X programme

CultureAI, the AI Usage Control platform helping organisations enable safe and compliant AI adoption, has been selected...

[object Object]

AI Browsers: A Security NightmareFlipping the Board on Decades of Security Progress

When a browser’s address bar begins to accept both URLs and natural language, and an AI agent can act across your accoun...