TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Analyzing a New MacOS DNS Hijacker: OS X/MaMi

13 pointsby Aaronnover 7 years ago

3 comments

tinus_hnover 7 years ago
It’s unsigned so the only way to run this is by bypassing the blocks on unsigned code and then dismissing the warning you get. But you can be sure this is going to be presented as the next MacOS virus that will infect your machine automatically when you click on a link in an email.
Rjevskiover 7 years ago
I will disagree on the &quot;how do I disinfect myself&quot; part - the only way to recover from this is to nuke the machine and consider all data it held compromised.<p>If this malware found its way onto your machine there&#x27;s a good chance other, much nastier malware could&#x27;ve done so as well, not to mention this malware having functions for running arbitrary AppleScript &amp; shell commands and so can fully compromise your machine.
评论 #16158247 未加载
Aaronnover 7 years ago
9to5mac article on this: <a href="https:&#x2F;&#x2F;9to5mac.com&#x2F;2018&#x2F;01&#x2F;15&#x2F;macos-dns-hijacking-malware&#x2F;" rel="nofollow">https:&#x2F;&#x2F;9to5mac.com&#x2F;2018&#x2F;01&#x2F;15&#x2F;macos-dns-hijacking-malware&#x2F;</a>