New Mac Malware Is a Reminder That All Computer Users Must Take Security Seriously

BY:

Jul 26, 2016

A piece of malware targeting Mac computers named Backdoor.MAC.Eleanor is making the rounds. While it may still come as news to some users that Macs can get infected, Mac OS X — Apple’s flagship operating system — is just as vulnerable as Microsoft Windows. And as Apple’s share of the personal computing market grows, so too does its appeal to hackers.

Mac Malware

Eleanor Gives Hackers Total Control

The Eleanor “backdoor” malware was discovered by security analysts earlier this month, but they believe it has been in the wildsince at least April. It was found hidden in a fake application named EasyDoc Converter on legitimate websites that host Mac app downloads. It has since been removed.

The Eleanor program inside EasyDoc Converter installs a hidden Command & Control (C&C) portal on a Mac that gives hackers the ability to edit and delete files, download programs, and stop your Mac’s core services. It even allows hackers to record audio and video from your Mac’s microphone and webcam.

Given this level of control, the consequences of catching the Eleanor backdoor are serious. Your Mac could become part of a remotely controlled botnet and used to attack outside businesses. Or the hackers could attack you by holding your files for ransom.

Macs Are Just as Vulnerable as PCs

The common computing myth persists that Macs do not get viruses, but security vulnerabilities exist in all software applications and operating systems. The more complex a piece of software is, the greater the risk for a vulnerability. In fact, OS X has the most publicly disclosed security vulnerabilities of any software product on the market today, surpassing Microsoft Windows and other popular operating systems.

This is not an indictment of OS X — not every single vulnerability on every platform is a critical risk — but it is a warning for business users not to assume that Apple’s history of fewer compromises is proof that they’re more secure. Currently, Macs make up just under 5 percent of the desktop computing market, but that market share is growing. That means their appeal to hackers is growing as well.

Best Practices for Securing Your Business’s Macs

Given this increasing risk of compromise, Mac users should make sure to follow the established best practices for securing any personal computer.

  • Apply Regular Security Updates. Usually, as soon as a vulnerability is found, developers start fixing it. Installing security updates as soon as possible can help keep you ahead of the hackers.
  • Disable Automatic Login. For PCs in public areas or where you’re concerned about physical security, this feature is a liability.
  • Use Reputable Endpoint Protection Software. Most of the major endpoint protection vendors have security software for Macs. Speak to your trusted IT expert about which application makes sense for your business.

If you suspect you have an infected Mac, speak to an IT security expert for servicing. While many security applications clean simple infections, more complex infections like the Eleanor malware can leave behind hidden components that could still damage your computer.

Get Further Advice on Business IT Security

Do you want further advice on how to handle the Eleanor malware or other IT security matters? Our team has years of experience to offer you. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Related Blogs

  • This image shows a hand on a knob that says “service level.” Next to the knob is an old-fashioned analog gauge to measure satisfaction, with settings of low, med, high, and max. The needle on the gauge is at max." alt="">
    Amazon Connect Metric Capabilities for Measuring Queue Service Levels – What You Need to Know

    Amazon Connect analytics users can define queue service levels to measure customer contacts answered by an agent between 1 second and 7 days for both real-time and historical metrics Key Takeaways:...

    Learn More
  • A contact center agent handling a call" alt="">
    Amazon Connect Introduces Audio Device Settings for Custom Contact Control Panel

    Amazon Connect now offers more freedom to agents in the selection of their preferred audio device setting in the Contact Control Panel — here’s how to go enable it Key Takeaways: The new audio...

    Learn More
  • This image shows a magnifying glass made up of people on a white background. This is meant to illustrate a close analysis of customers in order to serve them better." alt="">
    How to Use Amazon Contact Lens to Analyze Conversations

    Get real-time insight into customer sentiment and trends with Contact Lens for Amazon Connect Key Takeaways: Contact Lens for Amazon Connect gives contact center managers a better understanding of...

    Learn More