A recently discovered Mac OS X threat is the Airmail 3 scam which takes advantage of a software vulnerability, our guide will show users how to detect and remove active infections.
Airmail 3 Scam – How Did I Get It
Computer security experts have received reports of a dangerous Airmail 3 scam targeting Mac OS. It is rated as a severe threat due to the fact that there are several different ways that it can be delivered to the victims.
The hackers take advantage of a security vulnerability in the program (which is a popular alternative to Apple’s own “Mail”application) which automatically leads to an infection. For the hacker operators the most accessible approach is to use SPAM messages that contain the necessary code that will trigger this reaction. The dangerous code can be either directly embedded in the body contents or attached in a file or payload.
There are two main types of payload carriers that are most commonly used to spread viruses and threats like this one:
- Documents — The hackers can embed the necessary code triggering the Airmail 3 Exploit in macros. They can be made part of any standard document including rich text documents, presentations, databases and databases. Whenever they are opened by the victim users a notification prompt will appear asking them to enable the built-in macros.
- Software (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | SensorsTechForum.com authored by Martin Beltov. Read the original post at: https://sensorstechforum.com/mac-os-x-airmail-3-scam-detect-remove-infections/