Malware

Eleanor Mac malware connects your webcam to the dark web

The malware dubbed Backdoor.MAC.Eleanor is embedded surreptitiously in the fake app EasyDoc Coverter.app and allows to control your webcam from the dark web

Following the first ever instance of mac ransomware, recently reported by Palo Alto Networks. A second piece of malware has been discovered in the wild.

The malicious software dubbed Backdoor.MAC.Eleanor or OSX/Eleanor-A comes under the guise of a harmless file converter application and was readily available under a number of previously reputable download sites.

Bitdefender Labs explained in their report, that the software is embedded surreptitiously in the fake application EasyDoc Coverter.app.  The application itself serves no functionality, posing as a drag and drop utility to facilitate simple file conversion.

The phoney application after installation

What’s under the hood instead is a malicious suite of services with the ability to steal data, execute malicious code and even control the infected machine’s web camera.

Bitdefender explained in their report: “The backdoor is embedded into a fake file converter application that is accessible online on reputable sites offering Mac applications and software. The EasyDoc Converter.app poses as a drag-and-drop file converter, but has no real functionality – it simply downloads a malicious script.

“The backdoor is embedded into a fake file converter application that is accessible online on reputable sites offering Mac applications and software. The EasyDoc Converter.app poses as a drag-and-drop file converter, but has no real functionality – it simply downloads a malicious script.

This is a nasty backdoor that can steal data, execute remote code and access the webcam, among other things …”

Once initiated the application would install a hidden Tor service for Command and Control (C2) functionality, a web service as well as a Pastebin agent.

Once infected the Command and Control interface is used to manage the web service’s capabilities which amongst a plethora of other things allows for the use of Netcat, commonly known as ‘the hackers Swiss army knife’ and Wacaw, a command line tool which can be used for taking pictures and videos with your webcam.

Through this, the capabilities of the web service in particular grants functionality for a File Manager which can view, edit rename, upload and download files, allows command and script execution as well as offering bind and reverse shell connectivity, a simple packet crafter, the ability to connect and administer databases and even a process/task manager.

According to Bitdefender’s Tech Lead, Tiberius Axinte “This type of malware is particularly dangerous as it’s hard to detect and offers the attacker full control of the compromised system. For instance, someone can lock you out of your laptop, threaten to blackmail you to restore your private files or transform your laptop into a botnet to attack other devices. The possibilities are endless.”

The application however is not signed by an Apple developer ID which therefore means it won’t install unless you have allowed this specifically in your OS security settings.

Although this offers some protection, if a malicious player was able to get access to developer signed cryptographic keys then this thin layer wouldn’t offer the necessary levels of detection and prevention.

Written by: Steven Boyd

Steven is a security consultant, researcher, ethical hacker and freelance writer with over 16 years of experience in the industry. He has provided security consultancy to some of the world’s biggest banks, the private sector as well as public services and defense. He is the owner and creator of security blog www.CybrViews.com.

Twitter: @CybrViews

 

 

 

 

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Eleanot Mac Malware, cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

11 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

12 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

17 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

1 day ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.