An attack infrastructure detected earlier this year used additional malware that targeted Mac OS X machines.
Researchers from Norman Shark, who revealed the advanced persistent threat (APT) infrastructure 'Operation Hangover' in May, will present at next week's Black Hat conference in Las Vegas on new Mac malware they found in the attacks.
According to Dark Reading, Jonathan Camp who, along with fellow Norman Shark researcher Snorre Fagerland headed up the research on Operation Hangover, said that the company found more Mac malware after publishing its reports.
Camp said that it was interesting to drill down into how the actors in the campaign were organised and who was responsible for which piece of code or spear phish.
“They were not just focused on one specific target and they have lots of different people working on various elements of the campaign”, he said.
In the original report, Norman Shark said that most malware it had seen was written for Windows, using either C++ or Visual Basic, but there was also similar malware written for Mac OS.
A week before the Operation Hangover report was released, anti-virus vendor F-Secure highlighted that Mac spyware had been detected at the Oslo Freedom Forum. Norman Shark said that its investigation of the sample and command and control domain allowed it to conclusively say that the forum attack was performed through the same attack infrastructure.