G2 Logo

Trouble Brewing - Dissecting a fake homebrew update that stole user data

By Oliver Simonnet, Lead Cyber Security Researcher at CultureAI

Table of contents

  • Preamble
  • Malvertising - Effective and on the rise
  • Looking at the install command
  • Reverse engineering the payload
  • Reversing the decoding function:
  • Reversing the decryption function
  • Decoding the second stage payload:
  • Conclusion
  • Indicators of Compromise (IoCs)
  • References
Oliver Simonnet avatar

Oliver Simonnet

Lead Security Researcher

10 March 20258 min read
Share:

Recommended for you

[object Object]

The Beginning of a New Norm

The recent breach at Vercel has drawn a lot of attention, not because the initial entry point was unusual, but because o...

[object Object]

AI 2026: A Look Ahead

2026, the perfect time to reflect on how far technology has come and what lies ahead. Without a doubt, Artificial intell...

[object Object]

The Back Room Problem: Why Most Organisations Lack AI Data Visibility

It’s that time of year when shadows feel a little longer and the unknown a little closer. But in most organisations, the...