The Looming Threat of New Malware for Macs

BY:

Jul 21, 2016

The ecosystem of Apple’s Mac OS has long been heralded as a safe haven from the world of digital threats, and while its users were never immune to common phishing scams, they were largely in the clear from infiltration by most malware.

Malware Macs

In reality, the supposed invulnerability in Macs had less to do with anything unique about their software than their relative rarity on the market. When hackers or malware experts seek to infect computers and allow their code to spread from machine to machine, they focus their efforts on the operating systems with the widest reach. In the early 2000s, when Apple put renewed vigor into their marketing and advertising campaigns, their computers had such a fractionally small percentage of worldwide market share that they simply weren’t an attractive target. Even today, with all the emphasis on Microsoft losing market share to Apple, 2016 data still indicates that Apple has sold only 7.4 percent of the computers in 2016. As such, they historically haven’t been an especially lucrative target for hackers and are still a bit away from the mainstream.

Recently, that immunity may have begun changing as a new bit of malware was discovered. Named “Backdoor.MAC.Eleanor,” it’s installed while hidden within the seemingly innocuous Easy Doc Converter program that helps change Microsoft Office documents into other file formats. While it’s not uncommon for friendly software to have an unannounced stowaway, this file converter is available through otherwise reputable sites, allowing its creators to prey on unsuspecting individuals who let their guard down while browsing.

Once installed, Eleanor exploits a tool called “wacaw,” which grants access to the computer’s webcam, allowing it to capture images and videos of users and their surroundings without their knowledge. What the hackers plan to do with these images is largely unknown. But it’s safe to assume that the results would be similar to other blackmail-esque ransomeware scams, in which the hackers wait for a compromising photo to be taken and threaten to release it — or other private information — in exchange for money.

While this isn’t the first time Mac users have been exposed to potential threats, the relative simplicity of this sort of exploit is what makes it so effective. Rather than scanning drives or logging keyboard entries for financial information, the real danger here is in what the camera captures. While many computer owners have opted to proactively cover their camera when not in use, those with Apple’s Gatekeeper security package should remain unscathed as well, as the file converter program doesn’t possess a digitally signed certificate from Apple.

{company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Related Blogs

  • A depiction of a remote workforce connected via Amazon WorkSpaces." alt="">
    How Amazon WorkSpaces Clients Can Set up Notifications to Detect Anomalies at Scale Across a Remote Workforce

    Amazon WorkSpaces allows customers to configure alerts in case any connectivity issues arise, which helps quickly recognize and remedy the problem. Key Takeaways: Amazon WorkSpaces is a desktop...

    Learn More
  • This image shows a hand on a knob that says “service level.” Next to the knob is an old-fashioned analog gauge to measure satisfaction, with settings of low, med, high, and max. The needle on the gauge is at max." alt="">
    Amazon Connect Metric Capabilities for Measuring Queue Service Levels – What You Need to Know

    Amazon Connect analytics users can define queue service levels to measure customer contacts answered by an agent between 1 second and 7 days for both real-time and historical metrics Key Takeaways:...

    Learn More
  • A contact center agent handling a call" alt="">
    Amazon Connect Introduces Audio Device Settings for Custom Contact Control Panel

    Amazon Connect now offers more freedom to agents in the selection of their preferred audio device setting in the Contact Control Panel — here’s how to go enable it Key Takeaways: The new audio...

    Learn More