Login to your account

Username *
Password *
 
Your shopping cart is empty!

Malware OSX/Dok Causing Havoc for Mac OS

Written by Special Blogger
Rate this item
(1 Vote)

Apple Mac Viruses & Threats

OSX Dok is the most recent malware affecting Apple Mac devices that uses the Mac OS operating systems - all versions. Basically OSX/Dok target users email account and execute malicious codes from an attachment called Dokument.zip. The OSX Dok phishing scam is a deliberate cyber war campaign that attack Apple computers via unsolicited emails.

Once the email attachment is opened, the infected payload automatically propagate itself throughout the user's profile and operating system, then move on to monitor network traffic, system use and user keystrokes by elevating its security priviledges. 

OSX Dok behaves like a latent malware strain, meaning that it attempts to take on normal Mac OS operations to fool unsuspecting users while at the same time, remaining covert about its true intentions - minimum cause for alarm.

Whether Mac OS user like it or not, the threat is real and Apple is actively investigating and implementing steps to prevent serious system implications and unexpected compromise. Hackers are making use of a legitimate developer certificate to initiate malware attacks by eavesdropping on secure web traffic delivered over the secure HTTPS protocol. OSX/Dok threat was discovered and reported by Check Point who did an absolutely wonderful job of detailing the nature and routes taken by the malware from source to destination.

 

What are the System & User Security Implications?

Dokument.zip when unpackaged, will launch an application that install additional files and software on your Apple Mac device. There are also security critical processes thar are automatically triggered and used to transfer user specific details to the hackers' command center and this could include identity, financial or other personal information.

There are system processes files called launch agents that are set in motion to navigate and control the level and type of information that is actively transferred once the Mac is connected to the internet and in addition to the fake secure certficate that was registered as part of the user's keychain as a legitimate entity.

These malicious software components will need to be removed to prevent severe consequences to the affected user or business Mac devices.

Note: You will need security protection for your Apple Mac devices, whether they be desktop or laptop types. Check out available Anitivirus solutions for Mac here.

 

Here is a brief video explaining more about OSX Dok further

 
 
 
 
 
Read 50 times

Media

More in this category: « Trends in Artificial Intelligence