Keydnap new malware steals personal data from OSX platforms

The researchers of ESET they are investigating it OSX/Keydnap, one Trojan που steals passwords and keys from tthe keychain OSX creating a permanent one backdoor cuts. Although not yet known how they are being attacked victims, it is believed probably to postis given through the spam attachments, via of untrustworthy downloads ή via otherfactors.apple Keydnap

The downloader spreads as a file .zip με εκτελέσιμο αρχείο που μιμείται το Finder, το οποίο συνήθως χρησιμοποιείται σε JPEG ή αρχεία κειμένου. Αυτό αυξάνει την πιθανότητα ο παραλήπτης να κάνει διπλό κλικ στο αρχείο. Ξεκινώντας, ανοίγει ένα Port window which executes the malicious code.

At this point the backdoor cuts has been installed and malware is beginning to collect and extract basic information about it Mac in which he runs.

Once the C&C at its request, the Keydnap can request administrator permission by opening the usual window OS X used for this purpose. If the victim inserts his credentials, then the backdoor cuts will run as root, exporting the contents of the victim's key ring.

"While there are multiple security mechanisms embedded in the OS X platform to reduce malware, as we are seeing here, it is possible to mislead the user into performing an unfiltered, malicious code. All OS X users should remain alert as we still do not know how Kiddap is spreading, nor how many victims are out there, "he says. Marc-Etienne M. Léveilles, ESET Malware Researcher »

More information about Keydnap are in technical article In the official blog on security issues IT of ESET, WeLiveSecurity.com.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).