macOS systems abused in DDoS attacks | #CyberSecurity #Apple #NobodyIsPerfect  | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

DDoS-for-hire services, also known as DDoS booters, or DDoS stressors, are abusing macOS systems to launch DDoS attacks, ZDNet has learned.

These attacks are leveraging macOS systems where the Apple Remote Desktop feature has been enabled, and the computer is accessible from the internet, without being located inside a local network, or protected by a firewall.

More specifically, the attackers are leveraging the Apple Remote Management Service (ARMS) that is a part of the Apple Remote Desktop (ARD) feature.

When users enable the Remote Desktop capability on their macOS systems, the ARMS service starts on port 3283 and listens for incoming commands meant for the remote Mac.

HUGE "AMPLIFICATION FACTOR"
But sometime this year, cyber-criminals have realized that they can abuse the ARMS service as part of a so-called "DDoS amplification attack."

 

Learn more / En savoir plus / Mehr erfahren: 

 

https://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security