Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

New directions in Mac malware sees fresh families and signed code

by The Gurus
September 10, 2020
in Editor's News
Share on FacebookShare on Twitter

Fresh Mac-targeted malware has been detected, which creates a backdoor on a user’s machine.

According to the Hacker News, the Trojan known as “Leverage” has not exploited large numbers of users yet, but Apple has responded by updating its XProtect to detect the Trojan and prevent it from launching.
Taking advantage of two Java vulnerabilities, researchers found that the attack launches from a Java applet from a compromised website which drops to a Java archive, opening a backdoor to the user’s computer. Once installed, the Trojan connects to the command and control server on port 7777, used by the iChat server file transfer proxy.
According to F-Secure’s threat report for the first half of 2013, a total of 33 new families and variants of Mac malware were uncovered in the first half of 2013. It also discovered that Mac malware was signed by a developer in order to bypass the Gatekeeper protection which restricts the running of unapproved applications.
Last year, Apple was petrified by the Flashback botnet which was estimated to have impacted around 500,000 endpoints and used drive-by download techniques.
AlienVault’s Eduardo De la Arada said that for those who suspect that they have been infected with this malware, users should look in UserEvent app in /Users/Shared/ folder and remove it. “This avoids the malware to start on new computer starts-up. On the other hand, right now the C&C is down, so you can start a service listening on port 7777 and verify if the malware is already running in your box,” he said.
Its research found that the virus is written in Realbasic, and this provides the possibility to build the code to Windows and Linux platforms.
FacebookTweetLinkedIn
ShareTweet
Previous Post

NSA talk up information sharing concept

Next Post

Deloitte open Cyber Intelligence Centre

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information