Now, they are back in business with malware which targets Apple’s Mac OS X, according to Pedro Vilaca – a security researcher who works with Palo Alto. Vilaca wrote on his blog; “I just found some unique code in this dropper. This code checks for newer OS X versions and does not exist in the leaked source code. Either someone is maintaining and updating HackingTeam code or this is indeed a legit sample compiled by Hacking Team themselves. Reusage and repurpose of malware source code happens (Zeus for example) but my gut feeling and indicators seem to not point in that direction.”
The hacking team has vowed last june; that they will be back. And oh boy didn’t they announced their return with some style. Even though the codes are pretty much the same, but still it is enough for the malware to install the HackingTeam’s Remote Control System (RCS).
Pedro Vilaca, the researcher who labelled HackingTeam as “Italian Morons” said, the technique is similar to the older version of HackingTeam’s RCS and also the codes are similar to the one leaked last year.
How to check you Mac Device?
- To check if your mac device is infected look for Bs-V7qIU.cYL or _9g4cBUb.psr which is dropped into the ~/Library/Preferences/8pHbqThW/ directory.
- If any of these codes are detected on your device , your first step should be to delete the entire directory then remove the ~/Library/LaunchAgents/com.apple.FinderExtAvt.plist file.