HACKINTOSH.ORG | Macintosh discussion forums

Macintosh News => iPhone/iPod/iPad News => Topic started by: HCK on July 07, 2016, 04:05:21 pm



Title: New Mac malware in the wild, Backdoor.MAC.Elanor – can steal data, execute code, control webcam
Post by: HCK on July 07, 2016, 04:05:21 pm
New Mac malware in the wild, Backdoor.MAC.Elanor – can steal data, execute code, control webcam

<div class="feat-image">(https://9to5mac.files.wordpress.com/2016/07/controlpanel-1-1024x750-1.png?w=1600&h=1000#038;h=500)</div>
<p>After the first ever example of <a href="http://9to5mac.com/2016/03/06/first-os-x-ransomware-detected-in-the-wild-will-maliciously-encrypt-hard-drives-on-infected-macs/" target="_blank">Mac ransomware[/url] was found in the wild earlier this year, Bitdefender Labs has found (https://labs.bitdefender.com/2016/07/new-mac-backdoor-nukes-os-x-systems/) what it tells us is only the second example of true Mac malware to enter circulation this year, which it has dubbed Backdoor.MAC.Elanor. The malware application was available on a number of (<a href="https://blog.malwarebytes.com/cybercrime/2015/11/has-macupdate-fallen-to-the-adware-plague/" target="_blank">formerly?[/url]) reputable download sites such as MacUpdate.</p>

<p class="p1"><span class="s1">The backdoor is embedded into a fake file converter application that is accessible online on reputable sites offering Mac applications and software. The EasyDoc Converter.app poses as a drag-and-drop file converter, but has no real functionality – it simply downloads a malicious script.</span></p>
<p class="p1">This is a nasty backdoor that can steal data, execute remote code and access the webcam, among other things …</p>

<p> <a href="http://9to5mac.com/2016/07/06/backdoor-mac-elanor-mac-malware/#more-438158" class="more-link">more…[/url]</p>
Filed under: <a href='http://9to5mac.com/category/apple/'>Apple[/url]  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/9to5mac.wordpress.com/438158/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/9to5mac.wordpress.com/438158/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/9to5mac.wordpress.com/438158/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/9to5mac.wordpress.com/438158/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/9to5mac.wordpress.com/438158/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/9to5mac.wordpress.com/438158/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/9to5mac.wordpress.com/438158/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/9to5mac.wordpress.com/438158/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/9to5mac.wordpress.com/438158/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/9to5mac.wordpress.com/438158/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/9to5mac.wordpress.com/438158/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/9to5mac.wordpress.com/438158/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/9to5mac.wordpress.com/438158/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/9to5mac.wordpress.com/438158/" />[/url] <img alt="" border="0" src="(http://[img]http://pixel.wp.com/b.gif)[/img]?host=9to5mac.com&blog=22754319&post=438158&subd=9to5mac&ref=&feed=1" width="1" height="1" /><img alt="" border="0" src="(http://[img]http://pixel.wp.com/b.gif)[/img]?host=9to5mac.com&blog=22754319&post=438158&subd=9to5mac&ref=&feed=1" width="1" height="1" /><div class="feedflare">
<img src="http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=PowDjMQ4Who:Iqz-OrFaNhg:D7DqB2pKExk" border="0"></img> (http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?a=PowDjMQ4Who:Iqz-OrFaNhg:D7DqB2pKExk)
</div><img src="http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/PowDjMQ4Who" height="1" width="1" alt=""/>

Source: New Mac malware in the wild, Backdoor.MAC.Elanor – can steal data, execute code, control webcam (http://feedproxy.google.com/~r/9To5Mac-MacAllDay/~3/PowDjMQ4Who/)