The malware has been called Backdoor.MAC.Elanor and has been discovered by researchers at Bitdefender security.

Initially, the researchers found it difficult to accurately determine the means by which infection occurs.

As explained by the experts, one of the loader components distributed via ZIP-file.

Backdoor.MAC.Eleanor

As the ZIP-file contains the executable file in the Mach-O format, which disguised as a text or JPEG-file.

The Icloudsyncd executable file is stored in the Library/tool Support/com.apple.iCloud.sync.daemon directory.

By default, it prevents running any unsigned applications from the unidentified sources or developers.

How to Check & End Your Active Sessions on Facebook

Hence, the Gatekeeper would have blocked the malware, if it is enabled.

New Trojan Malware Affects 300,000 Chrome & Edge Users

RockYou2024 10 Billion Stolen Passwords Leaked Online