image source: apple |
It is a researcher of the security company Synack who revealed the discovery of a malware that would have been in place on the Mac environment for more than two years. Called Fruitfly, the malware had remained under the radars of all the security tools available on the market.
According to Patrick Wardle, Fruitfly was responsible for making screenshots of the infected station, acted as a keylogger (recording keystrokes hit) and could even activate the webcam on command.
image source: apple |
The malware could also collect data on devices connected to the infected station. Fruitfly is able to return data to specific domain names. The acquisition of one of these domain names found that the malware had infected at least 400 Macs, the IP addresses were contacted to inform them of the infection.
The breadth of malware and the lack of exploitation of domain names to recover the data suggest that Fruitfly was developed experimentally and without any real intention to harm. However, the fact that he remained for more than two years without alerting the various protection tools suggests that identical operating variants can be deployed around the world without anyone suspecting it.
💌 Follow by Email:Digital Channel
🌍🔍 Search Google :digitalchanneltv.tk
Click Index You Might Be Interested
suivre Dhaouadi Aymensur