macOS Malware 'Dok' Intercepts Web Traffic With Administrator Privileges: Check Point

Advertisement
By Shekhar Thakran | Updated: 1 May 2017 12:49 IST
Highlights
  • New malware comes signed with valid developer certificate
  • The malware was found to have 0 detections on VirusTotal
  • Malware reported to be targeting European users

If you are a macOS user and think that one of the major advantages of using this operating system is that you are immune to malware, this news is meant just for you. While macOS has had its time in the sun for long, a new malware that goes by the name of 'Dok' has been reported to specifically target the Apple operating system and potentially allows interception of communications traffic network and provides administrator privileges of the infected system.

Wondering how it is different from other malware that are floating around on the Internet? It is because OSX/Dok, as it is also known, was found to have 0 detections on VirusTotal scanner and comes signed with a valid developer certificate (authenticated by Apple), as per a report by software security firm Check Point. Dok has been reported to be the first major scale malware to target OS X users via a "coordinated email phishing attack" and affects all versions of the OS that have been released till now, as per the report.

The new Trojan has been reportedly targeting European users as of now and much like other attachment-based phishing attacks, requires users to open an infected ZIP file attachment that upon execution shows the user a "package is damaged" error message, but succeeds in copying itself onto the victim's system, and then throws up a fake update page as a persistent pop-up that phishes the user's credentials and provides administrator privileges. By proceeding to install a new root certificate on the victim's system, Dok gains access to the user's communication network with a Man-in-the-Middle (MITM) attack that allows an attacker to impersonate any website, including the ability to read secure HTTPS traffic. Notably, following the lead from some of the recent malware, Dok is able to delete its traces once its work is done as well.

Advertisement

In case you have already been targeted, you can simply follow the steps listed on iMore to clean up your system, as pointed out in a report by Engadget.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. Xiaomi Pad 8 Launched in India With Snapdragon 8s Gen 4 SoC, 9,200mAh Battery
  2. Here's How Many iPhone Units Apple Reportedly Assembled in India in 2025
  1. Jupiter Resumes Direct Motion This March as the Gas Giant Hits Peak Visibility for 2026 Skywatchers
  2. Samsung Testing 12,000mAh, 18,000mAh Batteries With Dual Cell and Triple Cell Designs, Leaked Reports Show
  3. OnePlus 15T White Colourway, Key Display Features Revealed as Company Opens Pre-Orders in China
  4. Microsoft Could Reportedly Price Next-Gen Xbox 'Project Helix' at $1,000 or More
  5. Ravam: Sound of Soul Streaming on AhaVideo: What You Need to Know About This New Horror Thriller
  6. Thailand Targets Crypto Mule Accounts Linked to Scams, Illegal Transfers as Authorities Freeze 10,000 Wallets
  7. Infinix GT 50 Pro 5G Real-Life Images Surface Online as Smartphone Arrives on BIS Database
  8. Microsoft’s New Copilot Cowork Can Take Actions and Autonomously Complete Tasks
  9. Mardaani 3 Set for OTT Release Soon: What You Need to Know About Shivani Shivaji Roy’s Return
  10. Lenovo Tab Plus Gen 2 Spotted in Leaked Renders That Point to Significant Design Overhaul
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.