fbpx

HackingTeam is back with Mac Malware

Italian company known as Hacking Team which sells surveillance software to governments agencies all over the world has been risen. This week a security researchers has identified a new malware, which is dubbed as ‘dropper’.

The Hacking Team is out of business since last July; when an unknown Hacker compromised their servers and stole their data. The data include their source codes, exploits, government agencies names and emails- which were leaked on the internet by the unknown notorious hacker.

Now, they are back in business with malware which targets Apple’s Mac OS X, according to Pedro Vilaca – a security researcher who works with Palo Alto. Vilaca wrote on his blog; “I just found some unique code in this dropper. This code checks for newer OS X versions and does not exist in the leaked source code. Either someone is maintaining and updating HackingTeam code or this is indeed a legit sample compiled by Hacking Team themselves. Reusage and repurpose of malware source code happens (Zeus for example) but my gut feeling and indicators seem to not point in that direction.”

The hacking team has vowed last june; that they will be back. And oh boy didn’t they announced their return with some style. Even though the codes are pretty much the same, but still it is enough for the malware to install the HackingTeam’s Remote Control System (RCS).

Pedro Vilaca, the researcher who labelled HackingTeam as “Italian Morons” said, the technique is similar to the older version of HackingTeam’s RCS and also the codes are similar to the one leaked last year.

How to check you Mac Device? 

  • To check if your mac device is infected look for Bs-V7qIU.cYL or _9g4cBUb.psr which is dropped into the ~/Library/Preferences/8pHbqThW/ directory
  • If any of these codes are detected on your device , your first step should be to delete the entire directory then remove the ~/Library/LaunchAgents/com.apple.FinderExtAvt.plist file.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...