Tag Archive for: backdoor

Warning: Serious Mac vulnerability could open permanent backdoor to hackers

A security researcher has discovered a new Mac vulnerability that can seriously affect some Mac owners, even though most users should be relatively safe because the security flaw apparently isn’t used on a wide scale yet. DON’T MISS: This is one of …
mac hacker – read more

World’s first (known) bootkit for OS X can permanently backdoor Macs

Securing Macs against stealthy malware infections could get more complicated thanks to a new proof-of-concept exploit that allows attackers with brief physical access to covertly replace the firmware of most machines built since 2011.

Once installed, the bootkit—that is, malware that replaces the firmware that is normally used to boot Macs—can control the system from the very first instruction. That allows the malware to bypass firmware passwords, passwords users enter to decrypt hard drives and to preinstall backdoors in the operating system before it starts running. Because it’s independent of the operating system and hard drive, it will survive both reformatting and OS reinstallation. And since it replaces the digital signature Apple uses to ensure only authorized firmware runs on Macs, there are few viable ways to disinfect infected boot systems. The proof-of-concept is the first of its kind on the OS X platform. While there are no known instances of bootkits for OS X in the wild, there is currently no way to detect them, either.

The malware has been dubbed Thunderstrike, because it spreads through maliciously modified peripheral devices that connect to a Mac’s Thunderbolt interface. When plugged into a Mac that’s in the process of booting up, the device injects what’s known as an Option ROM into the extensible firmware interface (EFI), the firmware responsible for starting a Mac’s system management mode and enabling other low-level functions before loading the OS. The Option ROM replaces the RSA encryption key Macs use to ensure only authorized firmware is installed. From there, the Thunderbolt device can install malicious firmware that can’t easily be removed by anyone who doesn’t have the new key.

Read 9 remaining paragraphs | Comments


Ars Technica » Technology Lab

Cyberespionage group starts using new Mac OS X backdoor program

A group of hackers known for past cyberespionage attacks against the U.S. Defense Industrial Base, as well as companies from the electronics and engineering sectors, has recently started using a backdoor program to target Mac OS X systems.

“The backdoor code was ported to OS X from a Windows backdoor that has been used extensively in targeted attacks over the past several years, having been updated many times in the process,” security researchers from FireEye said Thursday in a blog post.

The malicious program is dubbed XSLCmd and is capable of opening a reverse shell, listing and transferring files and installing additional malware on an infected computer. The OS X variant can also log keystrokes and capture screen shots, the FireEye researchers said.

To read this article in full or to leave a comment, please click here

Network World Security

Android Upgrades Open A Backdoor To Malware, Researchers Show – Forbes


CITEworld

Android Upgrades Open A Backdoor To Malware, Researchers Show
Forbes
But a team of researchers has found that for Google's Google's Android platform, operating system upgrades can also serve as a stealthy new method for malware to sneak its tricks past Android's security measures. In a paper they plan to present at the
Android Flaw Lets Hackers Hijack System UpdatesTom’s Guide

all 4 news articles »

“android security” – read more