Security News > 2021 > July > Mac Malware Used in Attacks Targeting Industrial Organizations in Middle East
A malicious campaign focused on the industrial sector in the Middle East has been expanded to also target Mac computers, security researchers at Kaspersky have discovered.
Dubbed WildPressure, the campaign started in May 2019 and for more than a year it involved only a Windows version of a malware named Milum.
In addition to the initially observed C++ iteration of the threat, the researchers discovered a corresponding Visual Basic Script variant that had the same version, but which came with a series of modules, including an orchestrator and three plugins.
Kaspersky's security researchers identified a malware variant written in Python, which can run on both Windows and macOS operating systems.
"All three versions of the Trojan were able to download and execute commands from the operator, collect information, and upgrade themselves to a newer version," Kaspersky told SecurityWeek.
According to Kaspersky, the new WildPressure activity seems focused on targets in the oil and gas industry in the Middle East.
News URL
Related news
- VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)
- Apple fixes two zero-days used in attacks on Intel-based Macs (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- FBI spots HiatusRAT malware attacks targeting web cameras, DVRs (source)
- Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack (source)