Campaign to distribute spyware aimed at macOS in Vietnam
Security experts discovered a campaign to distribute spyware with compelling content emails and attach a malicious text file to the Mac of a number of Vietnamese organizations and businesses.
Mr. Nguyen Minh Duc, Director of Information Security Company CyRadar said, when the victim opens files containing malicious code, the Macro feature of Microsoft Word will be exploited to extract a spyware that only runs on the system. macOS. The software then connects to the control server to steal information and send it to the attacker. Hackers can 'drop' other malicious code onto remote computers to control as well as a springboard to invade another computer.
CyRadar said that the current antivirus software cannot identify malicious files in this campaign. In addition, different victims will receive different files, making detection more difficult.
Currently, the number of Mac computer users is rising, attracting the attention of hackers. Meanwhile, due to previous attacks that often target devices running Windows operating systems, many Mac users still have no habit of noticing or taking reasonable measures to lead to gaps in the system. The organization's network and can easily be exploited.
To prevent sticking malicious code on macOS computers, users need to pay attention:
- Regularly update patches for software and operating systems.
- Be careful when receiving files, strange paths via email or chat.
- Equipping prestigious security software for macOS.
- Businesses and organizations need to have network security monitoring systems to prevent, protect and promptly detect attacks on users' computers.
See more:
- 9 things to do when detecting a computer infected with malware
- Warning: a new variant of the virus that fills virtual money via Facebook Messenger will appear every 10 minutes
- The appearance of malicious code makes iMessage on iPhone be stifled and remedied
- Discover a software stealing Facebook account on the phone developed by Vietnamese hackers
- Discovered a group of hackers who use secret code to spy on 21 countries
You should read it
- 10 typical malware types
- Why is the security tool only quarantined rather than deleting infected content?
- CertUtil.exe allows an attacker to download malicious code and bypass antivirus software
- Sneaking malware on the Internet
- What is FileRepMalware? Does it delete anything?
- How many types of malware do you know and how to prevent them?
- What is scareware? How to remove Scareware?
- How to use Malwarebytes Anti-Malware Home to find, remove spyware, ads, malicious ... on your computer
May be interested
- Black market explosionghost computer networks serve as a campaign to distribute spam and steal credit card information sold for $ 2. this is just one of the easy-to-find items in the 'black market' of cybercriminals today, according to panda security.
- Spyware 'made in Vietnam'one day at the end of the year, ms. phy, a maritime university student, opened her computer and received an offline message which is a link with a domain name starting with vuonnhac. i wonder if a friend sent me the song online, she was dry
- NoAdware v4.0: free from spyware infection!if you have ever accessed websites crack, keygen, downloaded music online ... then your computer may be infected with spyware (spyware).
- Kaspersky accused the APT32 hacker group of using the Google Play Store to spread spyware for yearskaspersky security researchers found a malicious campaign called phantomlance targeting android device users.
- The standard of spyware is adopteda coalition of software companies has agreed to a common measure in identifying and destroying spyware ('uninvited' programs) that specialize in monitoring web browsing and making it difficult.
- 5 basic steps to eradicate Spywarespyware causes pop-up ads, changes system settings, changes links to home pages, search pages, and especially reduces performance and destabilizes the system. spyware is one of these
- Spy tricks for 2005the ways that spyware is used to deceive computer users are numerous, increasing rapidly with the appearance of spyware. however, we would like to list nine methods that spyware is the most popular in 2005. nine ways
- 7 signs to recognize when your computer is infected with spywarewith the dangerous threats that spyware gives you now, you will wonder how to identify spyware in your system, here are some of the most common signs when your system is infected. you are infected with spyware.
- How to check for spyware on Android devicesspyware can secretly steal your personal information and forward it to malicious third parties for exploitation.
- 9/10 PC infected with spywarethe latest anti-spyware report by webroot software shows that after the decline in 2005, the rate of spyware infection has started to rise again and reach a record high since 2004 back here.