

It specializes in uploading passwords to the threat actor, but it places them in unprotected text files before it does so. The Proton Malware is an information thief that also offers a generic backdoor for remote access to attackers, although its last known servers aren't functional now. Since the downloads happen on a 'safe' site, the Proton Malware achieves distribution easily, with a request for admin access being the only warning.
Uninstall elmedia player software#
Incidents in 20 show that its threat actor is compromising legitimate sites with OS X software downloads and modifying them, as in the attacks against Handbrake DVD ripper, Elmedia Player one, and Internet Security X9. The Proton Malware differs from most threats with bundle-based distribution models by not using torrents or threatening applications. Once it's in, it collects data – and may make that information more accessible for others to collect later, even if the user removes the Trojan. Besides being particular to the OS X builds of Apple's operating system, the Trojan also has such unique properties as gaining victims by circulating inside the installers of legitimate software. The Proton Malware is a semi-famous Trojan and spyware combination that got its notice from the cyber-security industry due to its innovative choice of infection methods and unusual demographics. Seemingly Extinct Trojans Leaving a Lingering Poison Users should remove the Proton Malware and related threats through standard anti-malware services while cleaning up any infection side effects, such as passwords in non-secure text files. The Proton Malware targets Apple's old OS X operating system and provides attackers with admin control and collects passwords. The Proton Malware is a backdoor Trojan and spyware, also known as Calisto.
