Home Business IT Security Mac Trojan poses as PDF

Security companies are warning of the arrival of a new Mac Trojan - dubbed Revir - that poses as a PDF file.


Multiple security companies are warning that they have received samples of a new Mac Trojan. It seems that the Trojan has yet to be seen in the wild.

Dubbed Revir.A, the Trojan poses as a PDF file. Masking an executable as a document is a well-known trick.

When run, Revir.A does display a PDF. According to Sophos, the Chinese-language document is about the Diaoyu/Senkaku Islands, which are the subject of a territorial dispute between China and Japan.

Revir.A also downloads a backdoor (Imuler.A) which Intego says can take screenshots and send them to a remote server, as well as performing other unspecified actions. F-Secure reports that while the command and control server is online, it is not yet capable of communicating with the backdoor.

Once the wrinkles have been ironed out, the Trojan could be distributed in a number of ways, including email (perhaps with the contents of the PDF customised to attract the group being targeted by any particular batch).

"We consider the threat to be very low," said Intego officials. Still, it's one more thing to watch out for. Major anti-malware products have been updated to provide protection against Revir.A and Imuler.A. 


 

FREE REPORT - IT MONITORING TOOLS COMPARISON

Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.

DOWNLOAD!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences, a PhD in Industrial and Business Studies, and is a senior member of the Australian Computer Society.

Connect