Once installed on a system, Backdoor:OSX/XSLCmd wait for instructions from a remote server and execute them on the infected machine.
The F-Secure security product will automatically remove the file.
Backdoor:OSX/XSLCmd appears to share a significant amount of code with the XSLCmd backdoor previously known to target Windows systems, possibly indicating that the backdoor's authors have expanded their targets to include the rival operating system.
Once installed, possible actions carried out by the backdoor include installing other programs, steaking files, logging keystrokes, capturing screenshots and updating its own configuration. Captured information is forwarded to a remote server.
Date Created: -
Date Last Modified: -