![]() ![]() As can be seen from the screenshot above, it claims to be Bitdefender Adware Removal Tool. The biggest red flag, though, is the name of the application shown in the menu bar next to the Apple menu. There are some other red flags as well, such as some odd phrasing and other errors in the text shown. To those who know better, this doesn’t really look much like an actual Adobe Flash Player installer, but many people won’t realize that. When run, the malware immediately opens a window offering to install the update. The installer was a simple app, named “addone flashplayer” and has a Flash icon. That “Flash installer” was the malware dropper – although, as we’ll see, “dropper” may not be a very accurate term. The site showed a “broken video,” using the common trick of claiming that Adobe Flash Player was outdated and offering a link to a “Flash installer.” The malware was first found on a spearphishing site, claiming to offer “Special Programs and Courses” to interns at these companies. ![]() They report that this malware appears to be the work of Iranian hackers and is targeting US defense contractors, such as Lockheed Martin, Sierra Nevada Corporation, Raytheon, and Boeing. Researchers Claudio Guarnieri and Collin Anderson recently discovered new Mac malware, which they have dubbed MacDownloader.
0 Comments
Leave a Reply. |