This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Newly developed Mac malware from 'Operation Hangover' to be presented next week

Share this article:
'Dead' Flashback botnet descibed as the most widespread Mac malware to date
'Dead' Flashback botnet descibed as the most widespread Mac malware to date

An attack infrastructure detected earlier this year used additional malware that targeted Mac OS X machines.

Researchers from Norman Shark, who revealed the advanced persistent threat (APT) infrastructure 'Operation Hangover' in May, will present at next week's Black Hat conference in Las Vegas on new Mac malware they found in the attacks.

According to Dark Reading, Jonathan Camp who, along with fellow Norman Shark researcher Snorre Fagerland headed up the research on Operation Hangover, said that the company found more Mac malware after publishing its reports.

Camp said that it was interesting to drill down into how the actors in the campaign were organised and who was responsible for which piece of code or spear phish.

“They were not just focused on one specific target and they have lots of different people working on various elements of the campaign”, he said.

In the original report, Norman Shark said that most malware it had seen was written for Windows, using either C++ or Visual Basic, but there was also similar malware written for Mac OS.

A week before the Operation Hangover report was released, anti-virus vendor F-Secure highlighted that Mac spyware had been detected at the Oslo Freedom Forum. Norman Shark said that its investigation of the sample and command and control domain allowed it to conclusively say that the forum attack was performed through the same attack infrastructure.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Industry divided as Met Police recommends smartphone PINs

Industry divided as Met Police recommends smartphone PINs

After two years of quietly lobbying mobile phone manufacturers such as Apple and Samsung, the Metropolitan Police have gone public with its request for all mobile phone vendors to implement ...

New TorrentLocker ransomware trades on fear of CryptoLocker

New TorrentLocker ransomware trades on fear of CryptoLocker

A new breed of ransomware called TorrentLocker that mimics more feared versions like CryptoLocker and CryptoWall has been discovered targeting users in Australia.

UK Ministry of Defence launches £2 million cyber defence competition

UK Ministry of Defence launches £2 million cyber ...

The British government has kicked-off a £2 million contest to find new ways to protect the Ministry of Defence (MoD) computer systems from cyber-attacks using automated threat response.