/new-osxkeydnap-malware-hungry-credentia

  • ESET finds OS X malware that steals data from keychain and doubles as backdoor

    What we know is that a downloader component is distributed in a .zip file. The archive file contains a Mach-O executable file with an extension that looks benign, such as .txt or .jpg. However, the file extension actually contains a space character at the end, which means double-clicking the file in Finder will launch it in Terminal and not Preview or TextEdit.

    The ZIP also contains the Resource fork that contains the icon of the executable file. It mimics the icon Finder usually applies to JPEG or text files to increase the likelihood the recipient will double-click the file. Once started, a Terminal window opens and the malicious payload is executed.

    http://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials

    #malware #OSX #MacOS