Tag: os x
-
VB2016 video: Last-minute paper: A malicious OS X cocktail served from a tainted bottle
Though nowhere near as exotic as it was a few years ago, malware for OS X continues to attract researchers’ attention. This was certainly the case for the KeyRanger ransomware and the Keydnap credentials-stealer, both of which spread through a compromised server of the legitimate Transmission BitTorrent client. In a VB2016 last-minute presentation, ESET researchers…
-
VB2016 video: Last-minute paper: A malicious OS X cocktail served from a tainted bottle
Though nowhere near as exotic as it was a few years ago, malware for OS X continues to attract researchers’ attention. This was certainly the case for the KeyRanger ransomware and the Keydnap credentials-stealer, both of which spread through a compromised server of the legitimate Transmission BitTorrent client. In a VB2016 last-minute presentation, ESET researchers…
-
VB2016 video: Getting duped: piggybacking on webcam streams for surreptitious recordings
If you are going to be at RSA in San Francisco next week, we highly recommend you attend Patrick Wardle’s talk on OS X malware in 2016 – not just because it is important for Mac users to know that they too can fall victim to malware, but also because Patrick is an excellent speaker. We…
-
VB2016 video: Getting duped: piggybacking on webcam streams for surreptitious recordings
If you are going to be at RSA in San Francisco next week, we highly recommend you attend Patrick Wardle’s talk on OS X malware in 2016 – not just because it is important for Mac users to know that they too can fall victim to malware, but also because Patrick is an excellent speaker. We…
-
Paper: Dylib hijacking on OS X
Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks. A few years ago, DLL hijacking on Windows was really hot, despite the fact that the concept had been discussed by none other than the NSA as far back as 1998. Many applications load dynamic link libraries (DLLs) without specifying a…
-
Paper: Invading the core: iWorm’s infection vector and persistence mechanism
Malware spreads through infected torrent, then maintains persistence on the system. A month ago, security firm Dr.Web reported it had discovered a new malware variant targeting Mac OS X , that was subsequently dubbed ‘iWorm’. Apart from the fact that malware for OS X , though becoming more common, is still a bit of a…
-
VB2014 paper: Methods of malware persistence on Mac OS X
‘KnockKnock’ tool made available to the public. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Methods of malware persistence on Mac OS X’ by Synack researcher Patrick Wardle. It has been a while since Apple used the scarcity of…
-
VB2014 preview: Methods of malware persistence on Mac OS X
Patrick Wardle shows that OS X users really have something to worry about. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be presented at the event. Today, we look at the paper ‘ Methods of malware persistence on Mac OS…