![]() The analyzed sample contains a hardcoded list of IRC servers and channel that it attempts to connect to. ![]() It is actually an OS X port of the Linux family of backdoors that we have been detecting since 2002 as Linux/Tsunami. ESET’s research team compared this to samples in our malware collection and discovered that this code is derived from something we’ve seen before. The interesting part about it is that it’s a Mach-O binary – targeting Mac OS X. We’ve just come across an IRC controlled backdoor that enables the infected machine to become a bot for Distributed Denial of Service attacks. ESET’s research team compared this to samples in our malware collection and discovered that this code
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |