Title: Windows backdoor malware disguises itself as Adobe Flash on macOS Post by: HCK on May 06, 2017, 04:05:19 pm Windows backdoor malware disguises itself as Adobe Flash on macOS
<div class="feat-image">(https://9to5mac.files.wordpress.com/2017/05/snake_turla_uroburos_adobe_flash_player_macos_malware.jpg?quality=82&strip=all&w=1024&h=512)</div><p>A new piece of backdoor malware originally discovered on Windows has found a new home in macOS. Disguising itself as a legitimate Adobe Flash Player installer, the malware burrows into pre-existing macOS folders making it harder to spot. Having used a valid developer’s certificate, the malware (https://9to5mac.com/guides/malware) was set to run free on macOS even with Gatekeeper enabled.</p> <p>These certificates were created to help validate applications with Gatekeeper (https://9to5mac.com/guides/gatekeeper/), but lately have been used to spread malicious software. This is the second reported malware (https://9to5mac.com/2017/04/28/mac-malware-dok/) incident in the past week using a valid certificate.</p> <p> <a href="https://9to5mac.com/2017/05/05/windows-backdoor-malware-disguises-itself-as-adobe-flash-on-macos/#more-480338" class="more-link">more…[/url]</p><img alt="" border="0" src="https://pixel.wp.com/b.gif?host=9to5mac.com&blog=22754319&post=480338&subd=9to5mac&ref=&feed=1" width="1" height="1" /><img alt="" border="0" src="https://pixel.wp.com/b.gif?host=9to5mac.com&blog=22754319&post=480338&subd=9to5mac&ref=&feed=1" width="1" height="1" /><div class="feedflare"> <img src="http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=VJXcMUO2Ky0:bHbqxdyhhHw:D7DqB2pKExk" border="0"></img> (http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?a=VJXcMUO2Ky0:bHbqxdyhhHw:D7DqB2pKExk) </div><img src="http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/VJXcMUO2Ky0" height="1" width="1" alt=""/> Source: Windows backdoor malware disguises itself as Adobe Flash on macOS (http://feedproxy.google.com/~r/9To5Mac-MacAllDay/~3/VJXcMUO2Ky0/) |