Mac users and security experts have been familiar with the iWorm malware since 2014. When it first hit the headlines, there were quite a few speculations about its origin and objectives. One of the indisputable facts discovered was the ability of this infection to enslave host Macs by adding then to a botnet. Now in 2017, iWorm has obtained one more implication aside from the above-mentioned use case. One way or another, it is still a dangerous entity and must be eliminated ASAP.
There is a great deal of state-sponsored espionage aura surrounding the malware called MacDownloader. According to expert research, this new Mac OS X infection was created by Iranian cybercrooks who attempt to steal sensitive data from United States defense contractors and human rights organizations. Luckily, there are quite a few imperfections in how this virus operates for the time being, but it still a harmful entity regardless.
Ironically, the app called Mac Ads Cleaner is adware itself, although it is marketed as a tool for eradicating redundant advertising during one’s web browsing sessions. This potentially unwanted utility makes it into Macs along with harmless-looking application bundles. Its impact is a nuisance as it constantly displays popups stating that adware was found on the machine and instructing the victim to register its commercial version.
An aggressive browser hijacker has been zeroing in on Mac users lately. It redirects web traffic via dataloading.net, with the URL mostly coming with the “j/pne” tail. The landing sites may have a slightly different look and feel, but they tend to be camouflaged as Apple support pages. The anatomy of this attack is all about using a malicious Mac application to dupe people into calling a rogue support agent or installing potentially unwanted software.
When the MacWizz adware makes its way into a Mac, things get out of hand. It wreaks havoc with the victim’s web browsing activity by displaying a bevy of frustrating popup ads, banners, in-text links, and transitional advertisements on random websites that are visited. The infection arrives at Mac computers by means of application bundling, where the presence of the potentially unwanted entity is not disclosed in the clear.
A critical API vulnerability in Apple’s iOS and Mac OS X platform allows attackers to remotely hack into devices and steal users’ personal data, including passwords and other sensitive credentials. Counterintuitively, the attack with such potentially devastating outcomes is easy to pull off. All it takes is send a targeted user an image in TIFF format over the iMessage instant messaging app. Once the recipient opens it, a threat actor gets access to the gadget without any conspicuous signs of the compromise.