macOS Malware 'Dok' Intercepts Web Traffic With Administrator Privileges: Check Point

Advertisement
By Shekhar Thakran | Updated: 1 May 2017 12:49 IST
Highlights
  • New malware comes signed with valid developer certificate
  • The malware was found to have 0 detections on VirusTotal
  • Malware reported to be targeting European users

If you are a macOS user and think that one of the major advantages of using this operating system is that you are immune to malware, this news is meant just for you. While macOS has had its time in the sun for long, a new malware that goes by the name of 'Dok' has been reported to specifically target the Apple operating system and potentially allows interception of communications traffic network and provides administrator privileges of the infected system.

Wondering how it is different from other malware that are floating around on the Internet? It is because OSX/Dok, as it is also known, was found to have 0 detections on VirusTotal scanner and comes signed with a valid developer certificate (authenticated by Apple), as per a report by software security firm Check Point. Dok has been reported to be the first major scale malware to target OS X users via a "coordinated email phishing attack" and affects all versions of the OS that have been released till now, as per the report.

Advertisement

The new Trojan has been reportedly targeting European users as of now and much like other attachment-based phishing attacks, requires users to open an infected ZIP file attachment that upon execution shows the user a "package is damaged" error message, but succeeds in copying itself onto the victim's system, and then throws up a fake update page as a persistent pop-up that phishes the user's credentials and provides administrator privileges. By proceeding to install a new root certificate on the victim's system, Dok gains access to the user's communication network with a Man-in-the-Middle (MITM) attack that allows an attacker to impersonate any website, including the ability to read secure HTTPS traffic. Notably, following the lead from some of the recent malware, Dok is able to delete its traces once its work is done as well.

In case you have already been targeted, you can simply follow the steps listed on iMore to clean up your system, as pointed out in a report by Engadget.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. YouTube's 'Ask YouTube' AI Chatbot Offers Smart Replies With Videos, Shorts
  1. AirDrop via Quick Share Reportedly Expands to Oppo Find X9 Ultra, Vivo X300 Ultra
  2. OpenAI, Amazon Announce Multi-Year Strategic Partnership as Microsoft’s Exclusive Deal Ends
  3. US Judge Rejects Former FTX CEO Sam Bankman-Fried’s Bid for New Trial
  4. Valve Says It's 'Hard at Work' on Steam Deck 2
  5. OnePlus Nord CE 6, Nord CE 6 Lite Availability Details Announced Ahead of May 7 Launch Date
  6. Smartphone Buyers in India Prioritise AI and Real-World Usage, Flipkart Report Shows
  7. Google Pixel 11 Series’ Tensor G6 Chipset Could Be Significantly Faster Than Last Year’s Tensor G5 SoC, Leak Suggests
  8. Oppo Reno 16 Pro Key Specifications Leaked; Tipped to Launch in H2 2026
  9. Samsung Galaxy S27 Tipped to Arrive With Redesigned Camera Layout to Accomodate Qi2 Magnetic Charging
  10. Anthropic’s Claude Can Now Complete Creative Tasks in Adobe, Blender and Autodesk
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.