The first sample, called Tored-Fam, is a malicious code that spreads and spreads via email attachments. In fact, this is a variant of the Tored family of malware that has been in operation since 2008. This malicious family is primarily responsible for collecting email addresses and moving forward to another address to infect the system. new.
Sophos' analysts said the worm's source code was used to create a ghost computer network on a Mac called Raedbot. The author of this malicious code is a hacker who writes a virus called Ag_Raed who is Tunisian.
The second sample is a trojan called Jahlav-C that is often embedded in pornographic websites. This Jahlav-C worm often pretends to be an Activex video codec and requires the victim to download and install it to be able to view the content of the site.
' I feel very nervous when there is still the fact that users are not suspicious when buying and using Apple computers because they believe in the' theory 'that Mac computers are beautifully designed and unencrypted. malicious attacks like Windows computers , "said Graham Cluley, chief technology consultant at Sophos," even many people intentionally switched to using Macs to access more "safe" black web addresses. .