

The actors who managed to compromise the download mirror replaced the legitimate HandBrake file on the server with one packing a new variant of OSX.Proton RAT that was detailed in March this year. If it is present, it means that they were infected with malware. To check whether they are affected or not, users should look for a process called “Activity_agent” in the OSX Activity Monitor application.

HANDBRAKE FOR MAC VIRUS PASSWORD
They also note that impacted users should also “change all the passwords that may reside in OSX Ke圜hain or any browser password stores.” HandBrake also detailed a series of steps users should perform to clean up their systems in the event of infection.

While downloads via the application’s built-in updater with 1.0 and later are unaffected, those via the application’s built-in updater with 0.10.5 and earlier are not verified by a DSA Signature, and users should check their systems for malicious versions.
HANDBRAKE FOR MAC VIRUS UPDATE
Related: High-Profile Targets Attacked via Software Update Mechanism Further, HandBrake says it is rebuilding the download mirror server, a move that might affect performance and the availability of old versions of HandBrake. Only the download mirror at has been compromised, but it has been already shut down for investigation. The company notes that its primary download mirror and website were unaffected. You have 50/50 chance if you've downloaded HandBrake during this period,” the company says. Anyone who has installed HandBrake for Mac needs to verify their system is not infected with a Trojan. “Anyone who has downloaded HandBrake on Mac between and needs to verify the SHA1 / 256 sum of the file before running it. According to HandBrake, while not all users might have been affected, all of them should verify the downloaded file before running it. The company has posted a security alert on its website, informing Mac users that from Tuesday to Saturday of last week they might have downloaded a Trojanized version of the application. A download mirror server for the video converting tool HandBrake was recently compromised and configured to distribute a remote administration Trojan (RAT) for Mac computers.
