Keydnap new malware steals personal data from OSX platforms

The researchers of ESET they are investigating it OSX/Keydnap, one Trojan που steals passwords and keys from tthe keychain OSX creating a permanent one backdoor cuts. Although not yet known how they are being attacked victims, it is believed probably to postis given through the spam attachments, via downloads from unreliable websites or via otherfactors.apple Keydnap

The Keydnap downloader spreads as a file .zip with an executable file that mimics the Finder icon, which is usually used in JPEG or text files. This increases the likelihood of the recipient double-clicking on the file. Starting, opens one Port window which executes the malicious code.

At this point the backdoor cuts has been installed and malware is beginning to collect and extract basic information about it Mac in which he runs.

Once the C&C server at its request, the Keydnap can request administrator permission by opening the usual window OS X used for this purpose. If the victim inserts his credentials, then the backdoor cuts will run as root, exporting the contents of the victim's key ring.

“While there are multiple security mechanisms built into the OS X to limit malware, as we see here, it is possible to mislead the user to unfiltered, malicious code. All OS X users should remain vigilant as we still don't know how Keydnap is spreading, nor how many victims are out there," says Marc-Etienne M. Léveilles, ESET Malware Researcher »

More information about Keydnap are in technical article In the official blog for issues ς IT of ESET, WeLiveSecurity.com.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).