Blog

Russian hackers target Mac OS X users

2017Mar2Apple_AFancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit Linux, Android, and Windows vulnerabilities. Last month, they spread a new strain of malware that specifically targets Apple Macbooks. If you own a Mac or an iOS device, here are some crucial details about the new malware.

According to antivirus provider Bitdefender, the new malware — named Xagent — is a Mac OS backdoor that is usually delivered via spear phishing emails.

To deploy the malware, hackers attach a Trojan software downloader in the email. If users interact with it, the program immediately creates a backdoor and connects to the cybercriminal’s network.

The malware then avoids detection by checking for antivirus software; and if it determines that cybersecurity solutions are offline or unpatched, it will begin to send system information, locally-saved passwords, iPhone backups, and desktop screenshots back to hacker headquarters.

Although security updates for the new malware are still unavailable, there are some things you can do to minimize the possibility of infection.

Approach emails with caution
Since hackers use phishing scams to distribute the Xagent malware, train your staff to be critical of email links or attachments, even if from the CEO or a close friend. And under no circumstances should you interact with any email from an unknown sender.

Keep your OS up-to-date
Always remember to install the latest operating system and application updates to make sure that Mac vulnerabilities are covered immediately.

Don’t save passwords
While it may be easier to save your passwords on your local browser, it gives hackers easy access to your accounts. If you can’t remember all your passwords, consider password management software. And while we’re on the subject, make sure you set unique passwords with a good combination of letters, numbers, and symbols.

Encrypt backups
To add another layer of protection, encrypt your iOS backups. This ensures that unauthorized users won’t be able to read the contents of your iOS data even if they do manage to gain access to your computer.

Cybersecurity is a universal issue, even for Mac users. But adopting these basic security habits will keep any hacker, whether from Russia or the US, at bay. Fortify your defenses by giving us a call today.

Published with permission from TechAdvisory.org. Source.

Picture of Stringfellow Technology

Stringfellow Technology

Share this article:

Do you want to grow 30-50% faster than industry average?

We work best with growing firms who want proactive, executive-level IT strategy, not just help desk tickets.

If that’s you, we’d love to talk.

What You’ll Get From The Conversation:

  • Your Growth Readiness Score – A quick but powerful view of how well your current tech supports your business goals.
  • A Strategic Fit Assessment – Is your business aligned with how we deliver outcomes?
  • Real Recommendations – We’ll share what we’d do, even if we don’t work together.
 

We are accepting only a few new client partnerships per quarter, let’s see if we’re a fit.

We promise not to share your info with any other company.

Glenn Harris

Business Growth Advisor

Glenn Harris

With over 25 years of business technology experience, Glenn leads our efforts in delivering reliable IT to growing businesses looking to achieve success.

Categories

Contact Us To Learn More

Would you like to get in touch to learn more about our proven approach to managed IT services?

Fill out the form below and let’s connect.

"*" indicates required fields

Name*
Stay in the loop! Check this box to receive occasional updates and offers via SMS (optional).
This field is for validation purposes and should be left unchanged.

Schedule a Call with Glenn

This field is for validation purposes and should be left unchanged.