With a simple trick, the MacDownloader accesses passwords. The malware is intended to have employees of US armaments companies and human rights activists.
Disguised
as an Adobe Flash installer and BitDefender adware removal tool, the
MacDownloader malware attempts to forward passwords to its creators. This is what the two security researchers Claudio Guarnieri and Collin Anderson write in a report.
With a simple trick, the MacDownloader accesses passwords. The malware is intended to have employees of US armaments companies and human rights activists.
Disguised
as an Adobe Flash installer and BitDefender adware removal tool, the
MacDownloader malware attempts to forward passwords to its creators. This is what the two security researchers Claudio Guarnieri and Collin Anderson write in a report.
The two researchers describe the malware as the "first attempt of an amateur developer". Because the MacDownloader was sloppily programmed and the system dialogs full of writing errors. The malicious software is nevertheless dangerous: according to
computerworld.com the virus database VirusTotal did not recognize the
MacDownloader.
Armaments companies and human rights activists
Guarnieri and Anderson explain that the malware on a fake website of the American aviation company United Technologies emerged. The site was used in a spear-phishing attack via email to spread Windows malware.Meanwhile, the pest also attacks Mac computers.
The main goal was to be the first staff of US armaments companies like Lockheed Martin or Boeing, who were on the fake websiteFree courses and programs were lured into the trap. Later, the malware, according to security researchers, had also targeted human rights activists. For
security and stability reasons, these would increasingly rely on Apple
products, especially in Iran, and may therefore be better protected
against malware.
No comments:
Post a Comment