“Dockster” trojan for the Mac goes into the wild, plays on the same Java vulnerability as “Flashback”
Date: Tuesday, December 4th, 2012, 08:57
Category: News, security, Software
Ok, this shouldn’t be happening again.
Per F-Secure, a new piece of malware that takes advantage of a well-documented Java vulnerability has been found on a website dedicated to the Dalai Lama, with the trojan able to install itself on an unwitting Mac user’s computer to capture keystrokes and other sensitive data.
Dubbed “Dockster,” the malware was first found by antivirus and security firm Intego to have been uploaded to the VirusTotal detection service on Nov. 30. At the time of its discovery, the remote address associated with trojan was not active, possibly indicating that the code’s creators were testing whether it would be detected, but as of this writing the malicious code is now “in the wild.”
Similar to the Flashback exploit from September 2011, Dockster leverages the same Java vulnerability to drop the backdoor onto a Mac, which then executes code to create an agent that feeds keylogs and other sensitive information to an off-site server.
In the case of Flashback, which was also discovered by Intego, a reported 600,000 Macs were affected before both Apple and Oracle released a Java patches to remove the malware and protect against future attacks.
Although the newly-found Dockster takes advantage of an already fixed weakness, users who haven’t yet updated their Macs or are running older software may still be at risk.
In which case, try to ensure that your friends and family with older, pre-OS X 10.6 software are up to date and be careful out there.
- Apple issues statement regarding customer privacy/transparency in wake of “Prism” scandal
- Rogers Wireless, Telus, to offer iPad, iPad mini sales, Wind to offer nano-SIMs for iPhone 5 handset
- Review: Starcraft II: Heart of the Swarm
- European Union to remove roaming fees starting July 2014
- Microsoft releases long-awaited Office Mobile 365 for iOS