A Trojan-Proxy, hidden in cracked software available on unauthorized websites, has been identified by cyber security researchers. The Trojan, capable of compromising devices, is distributed within fake .PKG installers, which differ from legitimate disk images. The Trojan grants itself administrator permissions and communicates covertly with a command-control server. Versions targeting Android and Windows have also been found.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some