- Democrats vote to block transgender troop ban 2 Years Ago
- Twitch-famous bounty hunter kicks down target’s door in wildly popular live stream 2 Years Ago
- New GOP bill would audit major tech companies for bias 2 Years Ago
- Instagram artist accused of faking her paintings says they’re ‘100%’ real 2 Years Ago
- Trump refuses to apologize for Central Park Five death penalty ads Today 11:08 AM
- While Rubio smiles at Trump’s campaign rally, the internet drags him Today 11:04 AM
- Dr Disrespect is still banned from Twitch. When will he be back? Today 10:36 AM
- ‘Avengers: Endgame’ is returning to theaters with new material Today 10:18 AM
- House fails to pass amendment curbing government surveillance Today 10:12 AM
- What happened when Ed Krassenstein crashed the Chapo Trap House subreddit Today 9:21 AM
- Andrew Yang comes out as pro-Bird Scooters Today 8:59 AM
- Netflix claims Adam Sandler’s ‘Murder Mystery’ broke viewing records Today 8:09 AM
- How to watch ‘Yellowstone’ online for free Today 8:00 AM
- How online allies joined a trans artist’s street art war Today 7:30 AM
- These edited videos show the dark side of your favorite cartoons Today 7:00 AM
The Russian malware that took down the DNC can now infect Apple computers
URGENT: Download antivirus software.
Researchers at Bitdefender Labs found a sample of a Mac-native version of the malware linked to Russian threat group APT28, the government-linked hackers who took down the DNC. It allows them to obtain passwords, capture screenshots, and even steal iPhone backups stored on an infected Mac.
“The analysis reveals the presence of modules that can probe the system for hardware and software configurations, grab a list of running processes and run additional files, as well as get desktop screenshots and harvest browser passwords,” the Bitdefender Labs report reads. “The most important module, from an intelligence-gathering perspective, is the one that allows the operator(s) to infiltrate iPhone backups stored on a compromised Mac.”
The research group believes this discovery in Mac is linked to the APT28 group because of similarities in the Xagent malware agent found in the Windows/Linux attack. It says the presence of similar modules, like FileSystem, KeyLogger, and RemoteShell, also suggests the malware comes from the same group.
It also said the malware reports to the same command-and-control URL used by APT28 for its other ‘Komplex’ malware tool.
We don’t know much else about the malicious software. Bitdefender Labs is still analyzing the modules it found in the malware and plans to release a full report soon.
In the meantime, do yourself a favor and install some antivirus software.
Phillip Tracy is a former technology staff writer at the Daily Dot. He's an expert on smartphones, social media trends, and gadgets. He previously reported on IoT and telecom for RCR Wireless News and contributed to NewBay Media magazine. He now writes for Laptop magazine.