| Security Market Segment LS |
|---|
A security vendor has discovered a new type of Mac malware that listens in to HTTP and HTTPS traffic.
Revealed late last week by Check Point and dubbed OSX.Dok, the new malware was delivered as an email attachment. Europeans were the main target.
A sample email provided by the company purported to come from the Swiss government, and the attachment was supposedly a list of questions about the recipient's tax return.
You can readCheck Point's detailed description of how the malware works, but in a nutshell it nags the user into installing a fake security update, in the process giving it administrator privileges.
The malware was signed with a developer certificate, reducing the number of warning signs. But it did rely on recipients' naivety: apart from any other considerations, the covering email looked dodgy, and the "security update" notification had an unfamiliar format.
Apple has since revoked that developer certificate, and added Dok to the list of malware caught by XProtect. Additionally, Dok is now detected by many security products in addition to Check Point's offerings, including Ad-Aware, Avast, AVG, BitDefender, ClamAV, Kaspersky, McAfee, Sophos, Symantec and Trend Micro.
Completely removing all the items installed by the malware and reversing the other changes it makes is non-trivial. Malwarebytes provides some advice near the foot ofthis page.


Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.
Spot on Ms Roy. Along with this goes the trend to short, job ready courses at universities, expounded once by[…]
That MSI dragon laptop looks cool! But $11,799 ....... :O I might think on a bit longer :)
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]