{"id":38488,"date":"2017-07-27T12:41:20","date_gmt":"2017-07-27T17:41:20","guid":{"rendered":"http:\/\/webirix.com\/?p=38488"},"modified":"2017-07-27T13:05:30","modified_gmt":"2017-07-27T18:05:30","slug":"fruitfly-malware-lleva-anos-espiando-los-ordenadores-mac","status":"publish","type":"post","link":"https:\/\/webirix.com\/en\/fruitfly-malware-lleva-anos-espiando-los-ordenadores-mac\/","title":{"rendered":"&quot;Fruitfly&quot;, the malware that has been spying on Mac computers for years"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.abc.es\/media\/tecnologia\/2017\/07\/25\/malware-kDTE--620x349@abc.jpg\" alt=\"Hackers\" \/><\/p>\n<p>Six months ago the\u00a0<strong>&quot;Fruitfly&quot; malware<\/strong>\u00a0It was discovered and caused quite a stir, as the virus has been attacking for years without being noticed. How to operate this\u00a0<a href=\"http:\/\/www.abc.es\/tecnologia\/redes\/abci-capaz-hackear-ordenadores-y-iphone-antiguos-201703241029_noticia.html\" target=\"_blank\" rel=\"noopener noreferrer\">malware is to hijack<\/a>\u00a0remotely complete control of the infected computer: files, webcam, screen, roof and mouse.<\/p>\n<p>The cybersecurity company Malwarebytes was the one that discovered the first strain of\u00a0<strong>this virus at the beginning of the year<\/strong>, but recently a second version named &quot;FruitFly 2&quot; has appeared.<\/p>\n<p>However, little is known about\u00a0<a href=\"http:\/\/www.abc.es\/tecnologia\/informatica\/software\/abci-version-gratuita-spotify-infecta-malware-ordenadores-algunos-usuarios-201610052249_noticia.html\" target=\"_blank\" rel=\"noopener noreferrer\">the newly discovered infection<\/a>, above all because it is very rare to find malware directed at\u00a0<strong>attack Mac<\/strong>. Former NSA hacker and now Synack&#039;s chief security researcher,\u00a0<strong>Patrick Wardle<\/strong>, began in parallel to Apple patches an investigation.<\/p>\n<div id=\"roba_cintillo-id\"><\/div>\n<p>The results of the analyzes indicate that the virus has been infecting computers\u00a0<strong>for about a decade<\/strong>\u00a0and affects the\u00a0<a href=\"http:\/\/www.abc.es\/tecnologia\/informatica\/software\/abci-panda-global-protection-2016-mas-alla-simple-antivirus-201511182133_noticia.html\" target=\"_blank\" rel=\"noopener noreferrer\">newer versions of macOS<\/a>. &quot;Fruitfly&quot; connects to a command server where a cyber attacker can remotely spy on and control the Mac.<\/p>\n<p>However, the degree of infection is unknown in detail. &quot;It&#039;s not the most sophisticated Mac malware,&quot; Wardle noted as he points out &quot;<a href=\"http:\/\/www.zdnet.com\/article\/new-analysis-fruitfly-mac-malwware-almost-undetectable-backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet<\/a>&quot;, So to interact with him he had to&quot; create a\u00a0<strong>command and control server<\/strong>\u00a0that could speak the &#039;language&#039; of malware, &quot;he added.<\/p>\n<p>\u00abThe most interesting feature is that\u00a0<strong>malware can send an alert when user is active<\/strong>Wardle said, so the attacker can\u00a0<a href=\"http:\/\/www.abc.es\/tecnologia\/redes\/abci-faltaba-para-duro-malware-gooligan-roba-mas-millon-cuentas-google-201612011157_noticia.html\" target=\"_blank\" rel=\"noopener noreferrer\">avoid interfering<\/a>\u00a0with the computer silently. &quot;I have not seen it before,&quot; he further assured. Also, apparently this malware\u00a0<strong>p<\/strong><strong>can take screenshots<\/strong>\u00a0variable quality screen - a useful system for low bandwidth connections or to try to evade detection.<\/p>\n<p>Wardle points out that around\u00a0<strong>4<\/strong><strong>00 users contacted him as victims<\/strong>\u00a0of said infection and that the 90% of the known victims are settled in the United States. Which provided a notion that Mac viruses exist, although the number is less than on Windows computers. &quot;Mac users are more confident,&quot; Wardle told &quot;<a href=\"http:\/\/cnnespanol.cnn.com\/2017\/07\/25\/el-software-malicioso-que-espia-a-los-usuarios-de-las-computadoras-mac\/\" target=\"_blank\" rel=\"noopener noreferrer\">CNN<\/a>\u00bb.<\/p>\n<p>The former NSA hacker does not believe it is a case of\u00a0<a href=\"http:\/\/www.abc.es\/tecnologia\/redes\/abci-alerta-aumentan-smartphones-pero-triplica-volumen-malware-201602240939_noticia.html\" target=\"_blank\" rel=\"noopener noreferrer\">cyber espionage<\/a>\u00a0of State or a criminal who wants to kidnap the data in exchange for a ransom, but \u00ab<strong>I think their goals were much more insidious and sick: spying on people<\/strong>Wardle concluded.<\/p>","protected":false},"excerpt":{"rendered":"<p>Six months ago the &quot;Fruitfly&quot; malware was discovered and caused quite a stir, as the virus has been attacking for years without being noticed. The way this malware operates is to remotely hijack the complete control of the infected computer: files, webcam, screen, roof and mouse. The cybersecurity company Malwarebytes was the one that discovered the ...<\/p>","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2011],"tags":[],"class_list":["post-38488","post","type-post","status-publish","format-standard","hentry","category-actualidad"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/38488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/comments?post=38488"}],"version-history":[{"count":3,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/38488\/revisions"}],"predecessor-version":[{"id":38491,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/38488\/revisions\/38491"}],"wp:attachment":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/media?parent=38488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/categories?post=38488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/tags?post=38488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}