Thu. Aug 18th, 2022

Mac Malware Uses Twitter To Communicate With Infected Machines

Earlier last month, we have reported you about the return of the famous Mac OS X trojan called “FlashBack” that is popular for his entrance into Mac OS  through the custom installation of Flash installer on Mac OS, but on the arrival of newer malware version we have reported you that malware has become more evil than before, now it fools the Mac OS users with a certificate signature by Apple Inc, which lets the malware to enter in the Mac OS easily. This time the FlashBack comes with some more evil tricks as it occupies three different ways to enter in the Mac OS, and the new ability to hide its process from the Apple’s threat finding software.


Well, the Apple has yet to announce anything on the return of this malware back on Mac OS machines, the antivirus firm Intego, who firstly discovered the return of malware now reporting that new trojan software is like to use with evil mind servers through the Twitter, and exchange the potential information of the user through the specific encrypted code over the Twitter. The antivirus firm has been monitoring the malware from couple of weeks, and now reported that they have successful got some of its secretly sent tweets carrying potential data that was encrypted heavily with security.


The Intego researchers have claimed that the FlashBack is not using easily discoverable hashtags on Twitter to communicate with master computers; instead they create random hashtag on daily basis to share the secret information through the Twitter. Well, it is appeared to be the first trojan that is heavily involve in social networking, and shares the users potential information through social network sites.


In addition, the Intego antivirus firm has announced that they are monitoring the Twitter to look for any command issued by FlashBack that could harm the devices, and moreover they have told media that the new FlashBack is using unique web queries to search for Twitter contacts, to avoid the detection and removal of the malware.