Movatterモバイル変換


[0]ホーム

URL:


Security Market Segment LS
Tuesday, 02 May 2017 10:06

macOS Dok malware eavesdrops on Web traffic

By

A security vendor has discovered a new type of Mac malware that listens in to HTTP and HTTPS traffic.

Revealed late last week by Check Point and dubbed OSX.Dok, the new malware was delivered as an email attachment. Europeans were the main target.

A sample email provided by the company purported to come from the Swiss government, and the attachment was supposedly a list of questions about the recipient's tax return.

You can readCheck Point's detailed description of how the malware works, but in a nutshell it nags the user into installing a fake security update, in the process giving it administrator privileges.

The malware then configures the system to use a proxy server controlled by the attacker, and installs a certificate. Together, these measures allow a man-in-the-middle attack, listening to HTTP and HTTPS traffic and possibly tampering with it.

The malware was signed with a developer certificate, reducing the number of warning signs. But it did rely on recipients' naivety: apart from any other considerations, the covering email looked dodgy, and the "security update" notification had an unfamiliar format.

Apple has since revoked that developer certificate, and added Dok to the list of malware caught by XProtect. Additionally, Dok is now detected by many security products in addition to Check Point's offerings, including Ad-Aware, Avast, AVG, BitDefender, ClamAV, Kaspersky, McAfee, Sophos, Symantec and Trend Micro.

Completely removing all the items installed by the malware and reversing the other changes it makes is non-trivial. Malwarebytes provides some advice near the foot ofthis page.

Read4678 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletterhere
JOIN our iTWireTV our YouTube Communityhere
BACK TO LATEST NEWShere




Maximising Cloud Efficiency - LUMEN WEBINAR 23 April 2025

According to KPMG, companies typically spend 35% more on cloud than is required to deliver business objectives

The rush to the cloud has led to insufficient oversight, with many organisations struggling to balance the value of cloud agility and innovation against the need for guardrails to control costs.

Join us for an exclusive webinar on Cloud Optimisation.

In this event, the team from Lumen will explain how you can maximise cloud efficiency while reducing cost.

The session will reveal how to implement key steps for effective cloud optimisation.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Stephen Withers

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists?Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown:

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments


[8]ページ先頭

©2009-2025 Movatter.jp