Crypto-mining malware attacking Apple Mac with pirated software
A threat alert for some Apple Mac and MacBook computers running certain altered versions of Final Cut Pro editing software can hijack infected devices.
Pirated copies of the popular video editing software have been altered to contain a malicious instruction that takes over an infected Mac or MacBook forcing it to act as a cryptocurrency mining machine for a hacker.
Worse, this latest malware disguised as legit Final Cut Pro can bypass and shut down some of the security processes running on an infected device.
FIVE DISTURBING EXAMPLES OF WHY AI IS NOT QUITE THERE

Photo representing crypto-mining malware attackers. Many hackers target computers to manipulate cryptocurrency. (CyberGuy.com)
What is Cryptojacking?
Cryptojacking – or a crypto-mining malware attack – is when a hacker successfully goes undetected placing malware on a target computer in order to use its resources to manipulate cryptocurrency like Bitcoin.
Crypto-mining malware is generally difficult to root out and can compromise computers, laptops, smartphones, tablets, and connected devices. Strong antivirus protection can often eventually detect these hidden cryptojacking attacks when it notices unusual network traffic and processes running.
Once infected, a victim’s device can often exhibit very slow speeds when it has been actively cryptojacked.
SHOULD A FOURTH LIGHT BE ADDED TO TRAFFIC SIGNALS FOR AUTONOMOUS CARS?

Hackers are targeting Apple computers by using a legitimate-looking “Final Cut” app to install malware. Hackers then use the info to manipulate cryptocurrency. (CyberGuy.com)
Tracking down the threat
Investigative sleuthing by security professionals at Jamf Threat Labs led to tracing the malicious Final Cut Pro copies back to a known bad actor with a history of uploading and spreading viruses.
Since 2019, this same hacker is responsible for seeding multiple dangerous malware attacks hidden inside pirated copies of both Final Cut Pro and Logic Pro X.
IS YOUR APPLE AIRTAG ABOUT TO DIE?
How to avoid sneaky crypto-mining malware threats
Download only legit software. The safest place to download…