macOS
Eset
Macs
Windows
DazzleSpy
Google
C&C
Apple
the Internet Archives
the Ars Orbital Transmission
CNMN Collection
WIRED Media Group
Condé Nast
Dan Goodin
Mac
Eset
Marc-Etienne M.Léveillé
Ars
No matching tags
No matching tags
No matching tags
Hong Kong
No matching tags
Researchers have uncovered advanced, never-before-seen macOS malware that was installed using exploits that were almost impossible for most users to detect or stop once the users landed on a malicious website.The malware was a full-featured backdoor that was written from scratch, an indication that the developers behind it have significant resources and expertise. Secondly, they have the resources to develop complex exploits and their own spying malware, which is quite significant.”Indeed, researchers from Google’s threat analysis group who first uncovered the exploits said that, based on their analysis of the malware, they “believe this threat actor to be a well-resourced group, likely state-backed, with access to their own software engineering team based on the quality of the payload code.”As the Google researchers first noted, the malware was spread in watering-hole attacks that used both fake and hacked sites appealing to pro-democracy activists in Hong Kong.
As said here by Dan Goodin