Cyber Threats to Mac Computers on the Rise
For Mac users, a new cyber security threat is on the horizon. A tool called ‘Geacon’, used by hackers to gain unauthorised access to computers, is becoming more popular. This tool is a version of ‘Cobalt Strike’, another tool hackers have used for a long time to target Windows computers. But now, they’re using Geacon to focus on Macs.
SentinelOne, discovered this increase in threats after noticing more and more Geacon attacks appearing on a site called VirusTotal, which is used to spot and analyse suspicious files. Some of these attacks were just tests, but others were real attempts by hackers to gain access to computers. SentinelOne has found two recent examples of these Mac based attacks;
1: A file called ‘Xu Yiqing’s Resume_20230320.app’, discovered on 5th April. It looked like a simple resume, but it was actually a program designed to download a Geacon attack onto a Mac computer. Once downloaded, the Geacon attack could carry out various tasks, including accessing the internet, encrypting and decrypting data, downloading more attacks, and stealing data.
2: A file pretending to be SecureLink (a popular app for secure remote support), discovered on 11th April, was designed to ask for access to many of the computer’s features, like the camera, microphone, and other data. Once granted access, it could steal this information.
Whilst attacks on macOS based systems are less common than those on Windows, they do happen. Our Endpoint Detection & Response solution is designed to protect businesses from exactly these types of attacks and is already securing our customers from these Geacon attacks. EDR uses advanced Artificial Intelligence (AI) and Machine Learning to monitor your endpoints (including macOS devices) for unusual, suspicious or malicious files or activity and block it in its tracks, keeping your users and your business safe.
Latest News Stories
Is your business ready for the ISDN/PSTN Switch Off?
In 2025, the older ISDN and PSTN systems will be switched off, leaving businesses that are still using these older systems at that time without a functioning service. This means that now is the time to start thinking about updating your business phone system to a more...
Protecting your Business from Cyber Attack
Cyber attacks are a constant threat to modern businesses, but how well your business handles them depends on the solutions you have in place to protect yourself. Ignoring cybersecurity can have serious consequences, such as losing private information and breaching...
A notice regarding One2Call service pricing
This communication aims to provide you with as much notice as possible of anticipated AND in place supplier-led market price increases. We have been closely monitoring the sector and our suppliers, who have indicated that due to the adverse inflationary effects on...
Our Customers
Testimonials
Jeanette, Principle Support Ltd
One2Call staff are very helpful and friendly and they do have a fast turnaround with our enquiries. Thank you very much.
Mark Hamilton, Gooding Group
Good communicative engineer worked away discreetly and kept me informed of progress.
UK Steel
Very quick response on most of our issues. O2C look after us and keep us posted on progress with tickets.