123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

The Mac Malware Is Back

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

This year is probably one of the busiest years according to researchers, cyber security experts and computer forensics when asked about the Mac malware. So why do you think these people point that out? The reason is pretty simple really; it is the report from Apple, one of the leaders in the IT industry.
This report has opened a new update regarding a list of malware that is known to invade many desktops and devices with Mac operating systems. Among those malware is the Trojan dropper experts' call as Revir and including in the report is the new Trojan they call as Flashback. If Revir disguises itself as some sort of PDF file, the Flashback will cloak itself as some sort of update for the Flash Player. Intego, the security firm of Mac believes that the Trojan Flashback was not as widespread at start, but now there has been an increase in number of incidences and reports of Flashback infections.
Experts from Intego believe that this Trojan is slowly spreading its terror across different systems and it ...
... is spread through many malicious Websites. Whenever internet users visit the malicious websites, they will suddenly notice a particular message saying that their plug-in has crashed and that there are suspected errors in the plug-in. After these false messages, a screen will suddenly pop-up offering the user to fix the problem by installing the Adobe Flash installer. Unknown to the user, this installer is not an Adobe Flash installer but an installer for a Trojan horse, the Flashback. And if the user's browser is in Safari mode, then their computer will automatically download the said "safe" downloadable and a window for the installer will automatically open.
In the event that the user will install the said "safe" software, the Trojan horse Flashback will automatically deactivate the software needed for network security. The code in this particular malware will deactivate some security software only like Little Snitch, and luckily it has no effect in software like Intego VirusBarrierX6. Once the package has been installed, it will automatically delete the installation package. This malware will also automatically install a dynamic loader or dyld library and also an auto-launch code that allows the malware to inject its code into any applications the user will launch. This malware will also install a backdoor in the system where it will try to communicate to a remote server where it will send all the data it has stolen and this data will be in an RC4 encryption.
Experts who have completed cyber security training and computer forensics training believe that this malware infection is a fruit of genius social engineering. Most Mac users aren't easily fooled by this method because an installer for Mac will never appear this way. Unfortunately, there are two things that make this approach believable. Devices with Mac OS X Lion does not come in with a Flash Player package, so if they want to view Flash content found on the Internet they must install the software themselves. Second reason is that their Flash Player must have been set to automatically update itself and this might look like an update alert. These two reasons could easily trick or fool Mac users; they would unwittingly download a malicious malware that would compromise their important data.
However, the report did not mention how Internet users are being drawn into these malicious websites. But according to some experts who have completed computer forensic course, it is easy to imagine how the users are drawn to these sites. One example is creating viral videos and spreading them like wildfire. Crooks may use these viral videos like a video about a trending topic or a scandalous video or nude video of an artist or any known person. When Internet users will try to view the video, they are prompted to install a fake Adobe Flash update – a false update that is instead an installation of the said Trojan. In fact, this method has worked well in many Windows as well as Mac users for the past years.
Indeed, there are more malware that is written and intended for Windows users compared to Mac OS X. Still it doesn't mean that Mac computers and devices should be left unprotected.
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in cybersecurity and e-commerce. It is the owner and developer of 20 security certifications. EC-Council has trained over 90,000 security professionals and certified more than 40,000 members. These certifications are recognized worldwide and have received endorsements from various government agencies. They also offer trainings in computer forensics.
More information about EC-Council is available at www.eccouncil.org.

Total Views: 241Word Count: 773See All articles From Author

Add Comment

Computers Articles

1. Scraping Dan Murphys Liquor Products Details Data
Author: FoodDataScrape

2. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Lahore
Author: bluewizard.pk

3. How Does Blockchain Resolve Data Privacy And Security Issues For Businesses?
Author: Severus Snape

4. Scrape Quick-commerce Data From Deliveroo Hop Uae
Author: FoodDataScrape

5. Web Scraping Quick-commerce Data From Noon Minutes Uae
Author: FoodDataScrape

6. Helical Insight: Best Open Source Data Visualization Tool In 2025
Author: Vhelical

7. Scrape Top Selling Grocery Product Data From Walmart Usa
Author: FoodDataScrape

8. Extract Quick Commerce Data From Flipkart Minutes
Author: FoodDataScrape

9. Refurbished Laptop Scams And How To Safely Buy A Trusted Device
Author: Sujtha

10. Web Scraping Freshco Supermarket Product Data In Canada
Author: FoodDataScrape

11. How To Compare Two Lists In Excel​: A Definitive Guide For Data Professionals
Author: blackjack

12. Monthly Updated Uber Eats Menu Dataset For 500k+ Restaurants
Author: FoodDataScrape

13. Extract Mcdonalds Store Locations Data In Usa For Competitiveness
Author: FoodDataScrape

14. Scrape Spicy Food Trend Data In Usa 2025 For Competitive Advantage
Author: FoodDataScrape

15. Why Startups Should Invest In Custom Software Development Service
Author: Albert

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: