Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Mac Malware Targeting Dalai Lama Supporters

New malware targeting Mac users has been discovered on a website associated with the Dalai Lama.

“Acting on a tip, a member of our Threat Research team (Brod) has discovered a Dalai Lama related website is compromised and is pushing new Mac malware, called Dockster, using a Java-based exploit,” blogged Sean Sullivan, security advisor for F-Secure.

New malware targeting Mac users has been discovered on a website associated with the Dalai Lama.

“Acting on a tip, a member of our Threat Research team (Brod) has discovered a Dalai Lama related website is compromised and is pushing new Mac malware, called Dockster, using a Java-based exploit,” blogged Sean Sullivan, security advisor for F-Secure.

Mac OS X Targeted AttacksThe Java exploit targets the same vulnerability used by the “Flashback” malware attacks earlier this year – CVE-2012-0507, which has been patched. Current versions of Mac OS X and anyone with their browser’s Java plugin disabled should be safe from the exploit, Sullivan added.

“This is not the first time gyalwarinpoche.com has been compromised and it certainly isn’t the first time Tibetan related NGOs have been targeted,” he noted.

In fact, just last month Tibetan activists were observed being targeted by a new variant of the Imuler (Revir) Trojan via malicious emails. The messages would include images of pro-Tibetan groups as a lure to get victims to open the malicious files. Once executed, the malware would steal data from the system and upload it to a remote server.

Another attack targeting Tibetan activists was uncovered in March when researchers at Trend Micro released details about an attack campaign whose targets not only included the activists but also military research, aerospace and energy companies in India and Japan.

Advertisement. Scroll to continue reading.

The malware in the latest attack is detected as OSX/Bckdr-RNW by Sophos. According to Senior Technology Consultant Graham Cluley, once a computer is infected, attackers will be able to steal data from the system and capture the victim’s keystrokes.

“The attack was presumably designed to infect computers visiting the Dalai Lama-related website, which – one would imagine – would belong to [sympathizers] with the exiled Tibetan government,” he blogged.

There is also an exploit for CVE-2012-4681 that delivers a Windows-based payload – Trojan.Agent.AXMO, Sullivan noted. Like CVE-2012-0507, CVE-2012-4681 is a Java vulnerability and was patched by Oracle earlier in the year.

Related: Mac OS X Backdoor Found Targeting Uyghur Activists

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.