Cyber Threats to Mac Computers on the Rise
For Mac users, a new cyber security threat is on the horizon. A tool called ‘Geacon’, used by hackers to gain unauthorised access to computers, is becoming more popular. This tool is a version of ‘Cobalt Strike’, another tool hackers have used for a long time to target Windows computers. But now, they’re using Geacon to focus on Macs.
SentinelOne, discovered this increase in threats after noticing more and more Geacon attacks appearing on a site called VirusTotal, which is used to spot and analyse suspicious files. Some of these attacks were just tests, but others were real attempts by hackers to gain access to computers. SentinelOne has found two recent examples of these Mac based attacks;
1: A file called ‘Xu Yiqing’s Resume_20230320.app’, discovered on 5th April. It looked like a simple resume, but it was actually a program designed to download a Geacon attack onto a Mac computer. Once downloaded, the Geacon attack could carry out various tasks, including accessing the internet, encrypting and decrypting data, downloading more attacks, and stealing data.
2: A file pretending to be SecureLink (a popular app for secure remote support), discovered on 11th April, was designed to ask for access to many of the computer’s features, like the camera, microphone, and other data. Once granted access, it could steal this information.
Whilst attacks on macOS based systems are less common than those on Windows, they do happen. Our Endpoint Detection & Response solution is designed to protect businesses from exactly these types of attacks and is already securing our customers from these Geacon attacks. EDR uses advanced Artificial Intelligence (AI) and Machine Learning to monitor your endpoints (including macOS devices) for unusual, suspicious or malicious files or activity and block it in its tracks, keeping your users and your business safe.
Latest News Stories
Protect your Business from Targeted Phishing Attacks
Every day businesses are targeted by Phishing attacks of some form, this could be someone impersonating a brand or business to try and gain information from you, they could be asking you to click a link to sign in and ‘download a file’ which would steal your log...
Why does your business need Cyber Essentials Certification?
Is your business Cyber Essentials certified? Do you struggle to understand what you need to maintain solid cyber security? Our IT experts can do all the techie bits for you and guide you through the rest allowing you to build cyber essentials into the core of your...
See more, with our CCTV Solutions
Do you have a CCTV system in place? Does your current CCTV system have poor quality making its presence irrelevant? Do you want expert night coverage to keep your building secure at all times? That's where One2Call’s modern business CCTV systems come in, helping...
Our Customers
Testimonials
Sam P, 50Five
Very nice chap sorted out the problem for me. Nothing else I could ask for.
Danielle, Tremark Associates Ltd
Jordan dealt with both my issues quickly and were both sorted within the hour.
Hannah, Sutton McGrath Hartley
Easy to get in touch with, very efficient in responding and quick to provide assistance.