A New Mac Malware Could Nastily Take Over Your Computer
A newly detected malware targeted at MacOS devices is competent of intercepting all the internet activity on an infected device. This hijacking includes usage on secure sites and spying on HTTPS traffic. This new malware is dubbed as OSX/Dok and was first identified by the security firm Check Point.
The New Malware Can Bypass Mac Protection
The OSX/Dok malware is capable of affecting all the versions of MacOS and has yet to be recognized by Mac virus protection software. The new malware has been able to bypass Mac protection because it uses signed with a valid developer certificate authenticated by Apple itself. As of now, Mac antivirus programs have yet to refresh their databases to detect the DOK malware and advises Apple to revoke the developer certificate immediately.
How Does The Malware Works?
According to MacRumors, Dok malware works by obtaining administration privileges to install a new root certificate on the system of an Apple MacOS device. This enables the malware to gain access to all connections between the host of the Mac gadget and the internet. The effect of this includes traffic flowing through the connections encrypted with Secure Sockets Layer (SSL).
The first email that the owner will receive pretends to be the information about the inconsistencies in their tax return. Then, it will ask to download a zip file attachment which hides the malware. Gatekeeper, Apple's built-in security on MaxOS gadgets feature reportedly fails to recognize the malware because of its valid developer certificate.
After that, the malware presents a security message to the users which claim for a system update, which will require a password input. Then, the malware gets the complete control just like the admin account in order to adjust the network settings to redirect all outgoing connections through a proxy. It will also automatically install additional tools that allow it to perform an attack on all HTTPS traffic.
With all that established, the malware now can see and modify all the web browsing behavior of the Apple MacOS device. According to BGR, this includes any data sent over encrypted links that should be secure all the time. With that kind of ability, the attacker can steal any people’s login information for every site, including social media accounts and online banking details.
The best defense here isn’t antivirus software. The new malware Dok is a strong and fast enough to be treated with an antivirus application. Not opening any attachments from anyone could be a good start to prevent this new malware. Surely, Apple is moving their heads now to solve the problems facing by their customers.
Samsung Galaxy Note 7 Is Coming Back To South Korea In June
The refurbished Samsung Galaxy Note 7 devices would pack in a smaller 3,200 mAh battery as opposed to the original 3,500 mAh. The first batch of the units will be launched via three carriers in South Korea as early as June.
Apple Is Working On Its Own Visa Debit Cards
Apple Inc. has recently held discussions with payments industry partners about introducing its own Venmo competitor. The service would allow iPhone owners to send money digitally to other iPhone owners.
Moto E4, E4 Plus Specs And Price Confirmed With These New Leaks
Motorola E series smartphones, the Moto E4 and E4 Plus, are said to be coming this year. Ahead of the launch, complete specifications, price, and images of the upcoming Moto E4 and E4 Plus devices leak.
Google Pixel 2 Might Be Released Sooner Than Expected
Rumors last week said that the next Google flagship smartphones won't arrive until late 2017. However, the Google Pixel 2 and Pixel 2 XL may arrive sooner than expected.
iOS 11 Plagued with Untested Bugs and Early Adoption Pitfalls
Reports of nagging iOS 11 issues have started pouring in just a day after the software was released by Apple on supported devices.
MORE IN ITECHPOST
Link Building & Guest Posting Updates- 2020
Over the years, the importance of high-quality backlinks has only increased. What once used to be a quantitative measure, is now qualitatives in nature. In other words, the links are now scanned for the quality they bring in, along with the number of links.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
New Lawsuit Alleges Fortnite Video Game Is as Addictive as Cocaine
Epic Games, creator of the popular Fortnite video game, has been hit with a new lawsuit that alleges the game is as "addictive as cocaine" and that Epic has targeted children with its marketing. The popular game is played by more than a quarter-billion people.
Netflix is Raising Prices, Here’s How it Now Compares to Other Streaming Services
Once a brand gains the trust and loyalty of its market, it is only logical that it attempts to flex its dominant muscle. Such is the tale that fits the recent price hike coming from the stable of Netflix. Having baited consumers into believing that streaming, and not cable subscription, is the right way to go, Netflix has now decided to drop its own form of a bombshell on consumers in the form of price increment. The news, which was announced earlier this year, detailed that Netflix would be raising prices across all of its plans by 13 to 18 percent.