Dok: OSX malware uses stolen certs and reads HTTPS traffic | #Apple #CyberSecurity #Awareness | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Mac users beware as researchers have found yet another reason to rattle the false sense of security some may have concerning Macs and viruses.  


Checkpoint researchers spotted a Mac OSX malware, dubbed OSX/Dok that has been signed with an Apple signature and reads HTTPS traffic, Check Point lead researcher Ofer Caspi said in a 27 April blog post.


It is unclear how the Apple signature got into the hands of the malware's developers and that the signature is the reason why the malware has been able to bypass some native Apple protections and malware could allow an attacker to intercept a victim's web communications and worse.


The malware primarily targets European users, mainly in Germany and in Austria, and could allow an attacker to redirect victims to a remote proxy server controlled by its operator, where the attacker could steal banking credentials, hijack online accounts and leak sensitive information.


The malware was spread via phishing campaigns and at the time the malware was detected and analysed, it was still floating under the radar of Apple and by other third party security products leading researchers said.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?&tag=Dok

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security