MAC MALWARE TAKES SCREENSHOTS AND LOGS VICTIMS’ KEYSTROKES TO STEAL DATA
Security researchers have warned against a new Mac virus that can take screenshots of victims’ activity and log their keystrokes.
According to experts from Kaspersky Lab, Mokes.A takes screenshots every 30 seconds and can access users’ documents and key presses.
This could allow the cyber criminals behind the malware to gather information on victims’ online accounts, including usernames and passwords.
The backdoor is a Mac OS X variant of a threat that affects all major operating systems, including Windows and Linux, the researchers said.
The malware sends its data back to a command and control server. If the server is not available, it saves this in temporary files ready to upload when it returns.
“Back in January this year we found a new family of cross-platform backdoors for desktop environments,” wrote Kaspersky Lab’s Stefan Ortloff in a blog post.
“After the discovery of the binaries for Linux and Windows systems, we have now finally come across the OS X version of Mokes.A.”
He described the discovery as “the missing piece” as far as Mokes is concerned. The malware is just the latest in a series of security alerts for users of Apple products.
Apple recently released a patch for Mac OS X that fixed a trio of vulnerabilities known as Trident that could be used for sophisticated surveillance of individuals.
It had previously delivered an update for its iOS mobile operating system to patch the same flaws on iPhones and iPads after they were discovered by researchers.
Back in July, users of Apple devices were also advised to download an urgent update that fixed a vulnerability in the way its operating systems processed images.
And prior to that, researchers discovered a type of Mac malware that posed as an image file to install a backdoor and steal users’ Keychain passwords.
For more on the Mac version of Mokes.A, see the Kaspersky Lab blog.