<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mac backdoor Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/mac-backdoor/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 21 Jun 2018 20:43:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>MacOS Backdoor Spreading Through MS Word Document</title>
		<link>https://www.osradar.com/macos-backdoor-spreading-through-ms-word-document/</link>
					<comments>https://www.osradar.com/macos-backdoor-spreading-through-ms-word-document/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Fri, 06 Apr 2018 05:26:33 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[mac backdoor]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2413</guid>

					<description><![CDATA[<p>Backdoors are such tricks that inject a malware into a system for the further privilege in the system. Recently, a new MacOS backdoor has been identified that is being spread through MS Word documents. The infected document is being spread through phishing campaigns. Everyone should be aware of such attempts. According to the security researchers [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/macos-backdoor-spreading-through-ms-word-document/">MacOS Backdoor Spreading Through MS Word Document</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Backdoors are such tricks that inject a malware into a system for the further privilege in the system. Recently, a new MacOS backdoor has been identified that is being spread through MS Word documents. The infected document is being spread through phishing campaigns. Everyone should be aware of such attempts.</p>
<p>According to the security researchers of Trend Micro, the backdoor is most likely linked to the hacker group OceanLotus. The hacker group is responsible for launching high-profile attacks against media organizations, maritime construction films, human rights organizations etc.</p>
<h3>How the backdoor works</h3>
<p><img loading="lazy" class=" wp-image-2415 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/04/backdoor-in-word-document.jpg" alt="" width="665" height="266" srcset="https://www.osradar.com/wp-content/uploads/2018/04/backdoor-in-word-document.jpg 640w, https://www.osradar.com/wp-content/uploads/2018/04/backdoor-in-word-document-300x120.jpg 300w" sizes="(max-width: 665px) 100vw, 665px" /></p>
<p>The backdoor embedded in the MS Word is written in Perl. That’s why MacOS computers with Perl modules installed are more susceptible to the attack. The backdoor is written in “OSX_OCEANLOTUS.D” file where the macros are scatted by using decimal ASCII code.</p>
<p>The dropper is quite powerful. The strings in the dropper are encrypted. It uses an RSA256 key to encrypt the strings and encoded using a custom base64 encoding system.</p>
<h3>Backdoor functions</h3>
<p>The backdoor comes up with 2 important functions.</p>
<ul>
<li>infoClient – Checks the status of the computer (computer name, Mac OS X version, x86/x64 architecture, owner’s name etc.)</li>
<li>runHandle – Handles all the backdoor operations.</li>
</ul>
<p>The information the backdoor collects is sent to the hacker(s) via the C&amp;C server. The data is encrypted in several steps.</p>
<h3>How to stay safe</h3>
<p>The malware is spreading via phishing campaigns. Be careful from phishing. It’s an old, yet effective method that can easily fool anyone. You need to exercise caution for staying safe.</p>
<ul>
<li>Use a unique, personal email address.</li>
<li>Don’t share your email address with any untrusted label.</li>
<li>Use spam filters and anti-spam plugins (if available)</li>
<li>Don’t open any attachments from untrusted sources. Scan the file using <a href="https://www.virustotal.com/">VirusTotal</a></li>
</ul>
<p>Did you know that there are some outdated techs we still use today? <a href="https://www.osradar.com/outdated-technologies-that-are-still-used-today/">Check out some of the most successful outdated techs</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/macos-backdoor-spreading-through-ms-word-document/">MacOS Backdoor Spreading Through MS Word Document</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/macos-backdoor-spreading-through-ms-word-document/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
