While Apple malware isn’t unheard of, it is less often found in the wild. The illusion of perfect security entertained by many Apple users gets easily shattered when a new bug appears on the horizon. Eleanor is the latest of these OS-specific malware applications; it opens a backdoor into the computer it infects, allowing total control of the system through a hidden Tor service, a PasteBin client and a PHP Web Service. These three elements allow the attacker to gain access to the entire system and even use it without alerting the user to his presence.
How Does Eleanor Propagate?
Eleanor, apparently so-named by its creators, installs itself on its victims’ computers through an otherwise inoffensive application, EasyDoc Converter. This application, available through MacUpdate, converts Apple file formats to Microsoft Word formats. However, at the same time, it installs a backdoor for cybercriminals to access the computer.
What About Apple App Certification?
Apple users know that the company certifies every application available on its App Store. Apple is known to reject apps that don’t meet its high standards, and definitely wouldn’t allow such a disruptive piece of malware through its fingers.
EasyDoc Converter, however, is not certified with Apple. Mac OS X will show this to any user who attempts to install it, requiring the user to bypass this measure of protection by enabling the installation of unsigned third-party applications. Not every unsigned app is malicious, but every malicious app is unsigned.
As a result, while you may breeze through the warning pop-ups that occur when downloading and installing an application off the internet, you may want to double check those and make sure you’re only installing signed apps downloaded from the Apple App Store.
Enable GateKeeper On Your Mac
Another measure of protection that you should verify on your mac is called Gatekeeper. To enable this application, go to System Preferences and click on the Security & Privacy pane. From there, you should see whether Gatekeeper is enabled or disabled. Earlier versions of Mac OS X do not use Gatekeeper, but have similar settings available on the same page.
However, one of the best ways to protect your computer from malware is by keeping it updated. If you are not using the latest Mac OS X, you should download it and install it on your system. Also, make sure all of your applications are up to date as well. You may not have caught Eleanor, but you could easily catch the next one that comes around.
Alary Clinitech is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at (416) 291-7377 or send us an email at firstname.lastname@example.org for more information.
Thanks for helping us upgrade our Macs and get them working exactly as our business needs! Fast, convenient and very knowledgeable! You’re the best!
Alary Technologies has been our IT support team for the past year at the START Clinic for Mood and Anxiety Disorders. They have done a excellent job in upgrading our system, organization, and supporting us in technical computer matters. Compared to other IT companies we have worked with, Alary Technologies comes on top. Ahmed Kufaishi the Managing Director at Alary Technologies is solution focused, knowledgeable and makes an effort to really understand his clients’ needs. It has been a pleasure to work with Ahmed and Alary Technologies. I would recommend their services to other companies and clinics.
“We continue to work with Alary Technologies due to the fact that they are quite educated and knowledge based with current upgrades, and their commitment to their customers.”
Ahmed has been providing our company with expert IT services for close to 3 years. He has guided us through hardware upgrades, server back up procedures and was instrumental in brokering a custom software program that fully automated some key functions in our business. Ahmed has always been thoroughly professional in all his dealings with us and has provided consistent and sound advise for all of our IT requirements. We consider Ahmed and Alary Technologies to be an important partner for our business.
It is refreshing to work with someone who can organize things and describe in plain language. I have a large and growing knowledge base for my work as an architect. I have realized that I can’t do everything, that I do need a team member who can look after this one relatively small by crucial part of my practice.