This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Newly developed Mac malware from 'Operation Hangover' to be presented next week

Share this article:
'Dead' Flashback botnet descibed as the most widespread Mac malware to date
'Dead' Flashback botnet descibed as the most widespread Mac malware to date

An attack infrastructure detected earlier this year used additional malware that targeted Mac OS X machines.

Researchers from Norman Shark, who revealed the advanced persistent threat (APT) infrastructure 'Operation Hangover' in May, will present at next week's Black Hat conference in Las Vegas on new Mac malware they found in the attacks.

According to Dark Reading, Jonathan Camp who, along with fellow Norman Shark researcher Snorre Fagerland headed up the research on Operation Hangover, said that the company found more Mac malware after publishing its reports.

Camp said that it was interesting to drill down into how the actors in the campaign were organised and who was responsible for which piece of code or spear phish.

“They were not just focused on one specific target and they have lots of different people working on various elements of the campaign”, he said.

In the original report, Norman Shark said that most malware it had seen was written for Windows, using either C++ or Visual Basic, but there was also similar malware written for Mac OS.

A week before the Operation Hangover report was released, anti-virus vendor F-Secure highlighted that Mac spyware had been detected at the Oslo Freedom Forum. Norman Shark said that its investigation of the sample and command and control domain allowed it to conclusively say that the forum attack was performed through the same attack infrastructure.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

China refutes new FBI hacking claims

China refutes new FBI hacking claims

It's been another week of claims and counterclaims as the US and Chinese governments accuse each other of deviant cyber security practices.

SC Exclusive: Bank of England to appoint new CISO in January

SC Exclusive: Bank of England to appoint new ...

Bank of England Chief Information Security Officer (CISO) Don Randall is to leave his post in the New Year to take up an unspecified supervisory role, with William Brandon set ...

Sandworm vulnerability seen targeting SCADA-based systems

Sandworm vulnerability seen targeting SCADA-based systems

Hard on the heels of the `Sandworm' spy group revealed by iSIGHT Partners earlier in the week, Trend Micro says its has spotted the zero-day vulnerability of the same name ...