• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Hackers target Apple Mac OS X with 25 malware variants

Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure

cyber-security-man
Hackers targeting critical infrastructure Mac OS X systems
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 08 September 2014
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Hackers are besieging Apple OS X systems with 25 new malware variants, some of which are being used in targeted attacks, according to security firm F-Secure.

F-Secure reported uncovering the malware variants in its Threat Report H1 2014, claiming it discovered the first 20 attack tools in the opening months of the year.

"2014 started with almost 20 new unique variants discovered in the first two months alone, though this pace slowed later so that by the end of the H1 period, 25 new Mac threats had been found," the report said.

"Among the new unique variants, 13 belong to five new families, with the Mask and Clientsnow being involved in targeted attacks. The remaining three new families – Coinstealer, Cointhief and LaoShu – affect normal Mac users."

F-Secure senior security analyst Sean Sullivan told V3 the malware variants' appearance is particularly troubling as some of the attacks detected using them were targeting critical infrastructure areas.

"It's mostly targeting human rights activists (which focus heavily on rights in China). But then there are also efforts to compromise Macs within the energy industry and other sectors," he said.

"It appears to be the same sort of stuff as Havex, [going after] a wide range of targets. Possibly it is a campaign by a private ‘contractor' who is selling to particular nation states."

Havex is a family of remote-access Trojans known to have been used during several attacks on critical infrastructure. It is believed to have been used in targeted attacks for at least a year.

Sullivan said the lack of public information about the targeted attacks from affected businesses indicates they are either unaware or unable to comment on them.

"It's interesting to note there are no victims reported. We know about the targeted attacks against human rights activists because they speak out about it. Companies that are being attacked are either unaware or keep quiet," he said.

Apple has a closed security model and does not disclose any information about potential vulnerabilities until it has investigated and fixed them.

Apple's iOS mobile operating system remained malware free, despite the resurgence of Mac OS attacks.

F-Secure reported that of the 295 new mobile threat families and variants that were discovered, only one targeted iOS, and even this required the Apple device to be jailbroken to work. The remaining 294 are listed as targeting Android.

The stats mirror F-Secure's past mobile threat findings. The firm listed Android as being the intended victim of more than 99 percent of mobile malware in its previous Mobile Threat Report Q1 2014.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Operating Systems
  • Apple
  • Mac OS
  • Hacking
  • cyber-crime
  • Android
  • iOS
  • malware

V3 Latest

Hacker with laptop
Oracle MICROS hack claims more victims

Five more firms caught up in huge attack

  • Security
  • 12 August 2016
oneplus-3-review-main
OnePlus 3 review

The OnePlus flagship goes invite-free for 2016

  • Mobile Phones
  • 12 August 2016
Text entry on WatchMI platform
Researchers show off pressure-touch and movement control tech for wearables

University of St Andrews researchers could have opened up a whole new world for wearables

  • Gadgets
  • 12 August 2016
volkswagen
Wireless hack flaw puts 100 million VW cars at risk

Car maker says 'there is no 100 per cent guarantee for security'

  • Security
  • 12 August 2016
blog comments powered by Disqus
Back to Top

Most read

Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release
oneplus-3-review-main
OnePlus 3 review
Microsoft Windows XP boxes on the assembly line in 2001
Windows XP: 7 reasons ancient OS refuses to die
credit-card
Oracle hack potentially compromises almost every US credit card
Hacker with laptop
Oracle MICROS hack claims more victims
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016