“The malware that was discovered on his system acted to change these settings and ensure that they remained changed,” Reed writes. “Additionally, it installed a new trusted root certificate in the keychain.”
“These two actions are highly dangerous. By redirecting the computer’s DNS lookups to a malicious server, the hackers behind this malware could direct traffic to legitimate sites, such as bank sites, Amazon, and Apple’s iCloud/Apple ID services, to malicious phishing sites,” Reed writes. “The addition of a new certificate could be used to perform a “man-in-the-middle” attack, making these phishing sites appear to be legitimate.”
“Apple’s macOS includes some good security features that are helpful, but they are easily bypassed by new malware, and they don’t address the adware and PUP problem at all. macOS cannot be considered bulletproof,” Reed writes. “We know that not everyone wants to run antivirus software on their Macs, but if you’re looking for additional protection, Malwarebytes for Mac can help.”
Much more in the full article here.
MacDailyNews Take: Let’s be careful out there.