We have already reported you about the deadly Flashback Trojan program that affects around the half-million Mac machines with its recent return to the platform. Mostly, Mac OS users won’t use any kind of anti-virus software on their machines, as Apple committed to providing them the securest operating system platform, and so far, Apple actively combat with several malware programs to keep them out from its OS X running machines, but it seems that the most recently discovered return of Flashback malware broke the Apple’s security test, and finally now entering in the hundreds of Mac OS running machines.

However, the security firms are actively working on the solution to make Mac OS X again secure place for the users to use as their official operating system in the premium hardware purchased from Apple. During the research against Flashback, it is reported that security researchers have found a new Windows tool that is capable of generating infected files to affect the OS X running machines.  There are now speculations that hackers might be using this kind of Windows developed to tools to generate a different kind of malware programs to attack on OS X running machines.


The researchers have discovered a Windows hacker tool that is capable of generating malware injected Office documents to infect Mac OS X running machines. The infected Office-files are currently being used against the NGO (non-governmental organizations) to attack on their data. According to research, the hacking tool is using the old-age Office vulnerability from 2009 that allow hackers to easily execute the arbitrary code on Mac OS X running machines, and there are highly chances that a group of hackers is currently using the exploit to land on several Mac OS running machines using the backdoor scripts on Mac OS X systems.

The Windows tool that is being used by hacker to generate malicious code is called “MalHost-Setup.exe” is capable of generating several Office documents; such as Word, Excel, PowerPoint documents to affect the Mac OS X running machines.  The deep research regarding the exploit shows that the content of the Word document are not encrypted, and therefore, it allows hackers to generate their own versions of different malwares to affect the OS  X running machines.