"Yes, this Mac malware is stealing computing time as well as data," Cluley wrote, noting that graphics processing unit (GPU) resources are much better than regular CPUs at performing intensive mathematical calculations required for Bitcoin mining.
The malware also collects system information such as shell and browser history, takes screen captures, opens a proxy port and waits for the user to enter the user name and password, performs a scan for private files on the system and on mounted encrypted volumes using Spotlight, posting data files and looking for other infected Macs.
CFH HMagic bball season.
Let my fred's Four Horsemen ride.
All content owned by CycloneFanatic.com - All rights reserved 2005-09. By viewing this website you agree to the Terms of Service, Site Rules and Legal Disclaimer. The words, views, images and opinions expressed or provided by users do not reflect the opinions or views of CycloneFanatic.com or Iowa State University. The names, words, symbols, and graphics representing Iowa State University are trademarks and copyrights of the University protected by the trademark and copyright laws of the United States of America and other countries and are used on this web site under license from the University. Original site design, premise & construction by Jeremy Lind.