This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Newly developed Mac malware from 'Operation Hangover' to be presented next week

Share this article:
'Dead' Flashback botnet descibed as the most widespread Mac malware to date
'Dead' Flashback botnet descibed as the most widespread Mac malware to date

An attack infrastructure detected earlier this year used additional malware that targeted Mac OS X machines.

Researchers from Norman Shark, who revealed the advanced persistent threat (APT) infrastructure 'Operation Hangover' in May, will present at next week's Black Hat conference in Las Vegas on new Mac malware they found in the attacks.

According to Dark Reading, Jonathan Camp who, along with fellow Norman Shark researcher Snorre Fagerland headed up the research on Operation Hangover, said that the company found more Mac malware after publishing its reports.

Camp said that it was interesting to drill down into how the actors in the campaign were organised and who was responsible for which piece of code or spear phish.

“They were not just focused on one specific target and they have lots of different people working on various elements of the campaign”, he said.

In the original report, Norman Shark said that most malware it had seen was written for Windows, using either C++ or Visual Basic, but there was also similar malware written for Mac OS.

A week before the Operation Hangover report was released, anti-virus vendor F-Secure highlighted that Mac spyware had been detected at the Oslo Freedom Forum. Norman Shark said that its investigation of the sample and command and control domain allowed it to conclusively say that the forum attack was performed through the same attack infrastructure.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

SharePoint users break own security rules

SharePoint users break own security rules

Privilege controls can work, but cannot cater for all eventualities, says Quocirca analyst Rob Bamforth.

Heartbleed slows down the internet

Heartbleed slows down the internet

As Hearbleed slows down the internet, experts say that two-factor authentication may the way forward to protect our web sessions.

Biometric data collection sparks privacy debate

Biometric data collection sparks privacy debate

You could be implicated as a criminal suspect, just by virtue of having that image in the non-criminal file, says the Electronic Frontier Foundation (EFF).