Dok Malware Takes Complete Control of Your Mac

dok-malware-takes-complete-control-of-your-mac photo 1

The days of malware being just a problem for Windows users are long gone, with malicious software now appearing for all major operating systems. The latest, and most dangerous to hit the Mac yet, is called OSX/Dok. It targets any and all versions of Mac OS X and will take complete control of your Mac if you let it.

First the good news: in order for Dok to infect a Mac the user needs to open a .zip archive attached to an email. Most people's suspicions will be raised as soon as they see the Dokument.zip archive attached to an email they don't recognize. Those that don't are in for some pain.

According to Check Point, Dok is not currently detected on VirusTotal, meaning it won't get picked up by any security software run on your system (this will likely change quickly). Dok also uses a developer ceritificate that is signed and therefore authenticated by Apple, meaning your Mac will allow it to install and Gatekeeper is on no help.

Once successfully installed on your system, Dok enjoys complete access to all communications, even those sent over encyrpted SSL. Such access is acheieved by quietly redirecting the user's traffic through a malicious proxy server. All traffic can be monitored and the attacker can cherry pick through the details. Once done, the malware deletes itself from the system.

Related

  • Researchers ID Decades-Old 'Fruitfly' Mac MalwareResearchers ID Decades-Old 'Fruitfly' Mac Malware

If you do somehow get infected or are asked to help get rid of the malware on a friend's Mac, iMore posted detailed instructions on how to remove Dok. If you're unsure whether it is Dok, scroll through Check Point's detailed Dok article and you'll soon recognize if the malware is the same from the screenshots.

The same advice applies as always: if you have any suspicion at all about an email in your inbox, do not under any circumstances attempt to open the included attachment. 99 percent of the time it's going to be malicious and you'll regret taking the risk. Running a good security suite is also advised.

Recommended stories

The Complete Guide to Mastering Tabs in Safari

Tabs, glorious tabs! Every web browser now has them, including Apple’s Safari. In fact, tabs have been a part of Safari since the very beginning, but there’s a lot more to them than you may have realized. Let’s walk you through and show you all you need to know to become a Safari tab master.

Relax Dok Malware Takes Complete Control of Your Mac stories

Apple Aims to Use Only Recycled Materials

The company in its 2017 Environmental Responsibility Report said it aims to have a 'closed-loop' supply chain, 'where products are built using only renewable resources or recycled material.'

Here's One Idea for a Modular Mac Pro

Its mockup could be wildly inaccurate, but a German design studio took a stab at what it thinks Apple is working on to replace the current Mac Pro desktop.

More stories

What Is 5G?

AT&T, Verizon Wireless, and other carriers will start to launch 5G networks this year. But what exactly is 5G? Here's what we know so far.