Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/8/2016
01:30 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

An Inside Look At The New Apple Mac Malware 'Eleanor'

Researchers from Bitdefender find security hole that opens up a backdoor to the Mac OS X system.
Previous
1 of 8
Next

Apple Mac users, take cover: security researchers at Bitdefender recently found new malware that opens a back door into Mac OS X systems via the Tor network.

Alexandra Gheorghe, security specialist at Bitdefender, says the malware’s creators distribute the malicious code as EasyDoc Converter, a Mac application typically housed on a third-party application site that lets users convert Mac files to PC documents.

The malware strain -- dubbed Backdoor.MAC.Eleanor -- runs a malicious script that installs and registers three components at startup: a Tor Hidden Service, a PHP Web Service, and a PasteBin client.

“Once the components are installed on a system, they can take over commands, close applications, and steal just about all the information on the computer,” Gheorghe explains. “It also can access the computer’s webcam and take pictures and videos of its victims.”

Gheorghe says it’s not yet clear from what country the attack originated from, nor how destructive the malware has been. She says the Eleanor attackers could be after photos, credentials, documents, or other information stored on Macs, or they could be using the compromised Macs to infect other machines.

The malware was discovered through routine analysis Bitdefender runs daily on multiple feeds of data. There are basically two steps users can take to protect themselves, she says: First, don’t download applications from third-party app stores, only from the authorized Apple App Store. And second, install a reputable antivirus system designed to protect Macs.

Here’s a rundown of how the malware operates, according to Bitdefender's findings:

 

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...