A Trojan-Proxy, hidden in cracked software available on unauthorized websites, has been identified by cyber security researchers. The Trojan, capable of compromising devices, is distributed within fake .PKG installers, which differ from legitimate disk images. The Trojan grants itself administrator permissions and communicates covertly with a command-control server. Versions targeting Android and Windows have also been found.

The NCSC wants developers to get serious on software security
The NCSC’s new Software Security Code of Practice has been praised by cyber professionals as a significant advancement in enhancing software supply chain security.