A custom OS X backdoor designed for use in targeted attacks. It can make screenshots of the user’s current session and execute commands on the infected machine. It is spread through Java exploits.
Mitigation is where enterprises need to start, prevention being significantly more effective and more cost-efficient than remediation after an attack
Read more