Windows and Mac versions of the software were compromised and modified by the attackers in order to deliver additional information stealing malware to the user’s computer,” reads the technical write-up. According to the security team, the information gathered by the malware possibly enabled attackers to gauge if the victim was a candidate for further compromise.
Read full article on Infosecurity