![]() With built-in methods for communicating with a command and control server, along with remote control functionality, Fruitfly could let a hacker do a lot. Infected Macs would also allow it to probe and map network connections, eventually spreading over to other devices. However, it contained code meant for capturing screenshots, taking over a user’s webcam to snap pictures and some other features. ![]() That’s not to say it wasn’t a very sophisticated piece of malware in fact, it appeared to be rather old. This one appeared very early in January, and it seemed to be purpose-built for corporate espionage. We started the year off with some startling news: the discovery of the so-called Fruitfly backdoor.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |