
Under normal circumstances, https would prevent a MITM attack from taking place as the MITM would be detected, and your browser would then block access to the secure server. This type of attack is known as a MITM (or Man in the Middle) as the rogue server sits between you and the site you’re trying to access.ĭoesn’t HTTPS and the padlock/green browser bar prevent this? It then reconfigures your network settings to direct all network traffic through that tunnel, allowing the rogue server to see and manipulate it. Using a LaunchAgent ensures it runs every time you startup your Mac.
#CLAMXAV MALWARE SOFTWARE#
These additional downloads are huge, so it can take a long time while the software looks like it’s hung and apparently doing nothing.Įventually, after pummelling your hard disk with thousands of files, Dok installs a couple of LaunchAgents (disguised to look like they’re from Apple) which set up a tunnel into the proxy server on the dark web. When it first runs, Dok downloads a litany of other software (some legitimate like Apple’s developer tools, some less-so like tor).

What’s particularly worrying about this new malware is that it’s also capable of reading all your protected (https) web traffic, so this means it can also read any username and passwords that you submit anywhere and even see/modify the content of web pages on sensitive sites like internet banking.


It then proceeds to set up your computer to route all your web traffic through a server in the dark web, allowing the criminals to read all the web pages you visit and potentially even inject content into those pages.
