However, after clicking on the malicious Word document and before running it on your system, Mac users are always prompted to enable macros.ĭenying permission can save you, but if enabled ignoring warnings, the embedded macro executes a function, coded in Python, that downloads the malware payload to infect the Mac PCs, allowing hackers to monitor webcams, access browser history logs, and steal password and encryption keys.Īccording to a blog post published this week by Patrick Wardle, director of research at security firm Synack, the Python function is virtually identical to EmPyre – an open source Mac and Linux post-exploitation agent. Allies and Rivals Digest Trump's Victory – Carnegie Endowment for International Peace.docm." One such malicious Word file discovered by the researcher was titled " U.S. The hack tricks victims into opening infected Word documents that subsequently run malicious macros. However, security researchers have now detected the first in-the-wild instance of hackers are making use of malicious macros in Word documents to install malware on Mac computers and steal your data – an old Windows technique. Until now, hackers were cleverly using this technique to target Windows. Microsoft Office programs support Macros written in Visual Basic for Applications (VBA), but they can also be used for malicious activities like installing malware. Macro is a series of commands and actions that help automate some tasks. You might be familiar with the message that reads: " Warning: This document contains macros." The concept of Macros dates back to 1990s. The emergence of the first macro-based Word document attack against Apple's macOS platform is the latest example to prove this. After targeting Windows-based computers over the past few years, hackers are now shifting their interest to Macs as well.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |