An Inside Look At The New Apple Mac Malware 'Eleanor'

Researchers from Bitdefender find security hole that opens up a backdoor to the Mac OS X system.

Steve Zurier, Contributing Writer, Dark Reading

July 8, 2016

8 Slides

Already have an account?

Apple Mac users, take cover: security researchers at Bitdefender recently found new malware that opens a back door into Mac OS X systems via the Tor network.

Alexandra Gheorghe, security specialist at Bitdefender, says the malware’s creators distribute the malicious code as EasyDoc Converter, a Mac application typically housed on a third-party application site that lets users convert Mac files to PC documents.

The malware strain -- dubbed Backdoor.MAC.Eleanor -- runs a malicious script that installs and registers three components at startup: a Tor Hidden Service, a PHP Web Service, and a PasteBin client.

“Once the components are installed on a system, they can take over commands, close applications, and steal just about all the information on the computer,” Gheorghe explains. “It also can access the computer’s webcam and take pictures and videos of its victims.”

Gheorghe says it’s not yet clear from what country the attack originated from, nor how destructive the malware has been. She says the Eleanor attackers could be after photos, credentials, documents, or other information stored on Macs, or they could be using the compromised Macs to infect other machines.

The malware was discovered through routine analysis Bitdefender runs daily on multiple feeds of data. There are basically two steps users can take to protect themselves, she says: First, don’t download applications from third-party app stores, only from the authorized Apple App Store. And second, install a reputable antivirus system designed to protect Macs.

Here’s a rundown of how the malware operates, according to Bitdefender's findings:

About the Author

Steve Zurier

Contributing Writer, Dark Reading

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights