Another malware campaign emanating from China targeting both Windows and Mac devices that seeks to steal sensitive information has been uncovered.
The malware was revealed by Trend Micro researcher Ivan Macalintal, who linked it to the same command and control server used in the so-called Gh0st remote access Trojan (RAT) campaign seen at the end of March.
The Malware is believed to have been developed in China, and is similar to the advanced persistent threat (APT) style of attacks that were used against energy firms in 2011.
The malware appears to be transmitted via an email masquerading as an invite to a Tibetan film festival and is primarily aimed at pro-Tibetan organisations.
The email contains a malicious link that when clicked takes the user to a website which determines whether they are on a Mac or Windows system, subsequently loading a Java applet designed to exploit a vulnerability in the Java Runtime Environment.
The vulnerability allows the hacker to install a different backdoor for Windows or Mac OSX, granting hackers access to the same command and control server used in Gh0st RAT attacks.
The Trojan is one of many recent malwares believed to have stemmed from China.
Other recent examples were discovered targeting Android smartphones. For example, a reworked version of the Legacy Native (LeNa) Android malware and a new Trojan pretending to be legitimate Chinese game 'The Roar of the Pharaoh'.
Facebook database included text-message metadata - despite not using Facebook Messenger for SMS
Successful attack could result in harm to patients and financial loss, warns NHS governing body