{"id":1518,"date":"2010-04-16T09:45:51","date_gmt":"2010-04-16T16:45:51","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1518"},"modified":"2020-02-05T11:30:33","modified_gmt":"2020-02-05T19:30:33","slug":"intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/","title":{"rendered":"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs &#8211; Intego Security Memo"},"content":{"rendered":"<p><b>Malware<\/b>: OSX\/HellRTS.D<\/p>\n<p><b>Discovered<\/b>: April 14, 2010<\/p>\n<p><b>Risk<\/b>: Low<\/p>\n<p><b>Description<\/b>: Intego has discovered a new variant of a malware for Mac, called HellRTS, which, when installed on computers running Mac OS X, opens a backdoor that allows remote users to take control of infected Macs and perform actions on them. Intego identifies this backdoor as OSX\/HellRTS.D, a variant of an early Mac OS X malware first spotted in 2004.<\/p>\n<p><img src=\"https:\/\/web.archive.org\/web\/20100622144450im_\/http:\/\/www.intego.com\/news\/hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs.png\" \/><\/p>\n<p>HellRTS, built in RealBasic, and a Universal Binary able to run on both PowerPC- and Intel-Based Macs, is able to perform a number of operations if installed on a Mac. It sets up its own server and configures a server port and password. It duplicates itself, using the names of different applications, adding the new version to a user\u2019s login items, to ensure that it starts up at login. (These different names can make it hard to detect, not only in login items, but also in Activity Monitor.) It can send e-mail with its own mail server, contact a remote server, and provide direct access to an infected Mac. It can also perform a number of operations such as providing remote screen-sharing access, shutting down or restarting a Mac, accessing an infected Mac\u2019s clipboard, and much more.<br \/>\nThis backdoor requires installation on a Mac, which could be carried out via a Trojan horse, or by exploiting a vulnerability in a program that accesses the Internet (such as a web browser). While Intego has not found any instances of Macs being infected by this in the wild, the fact that this malware is being distributed on a number of forums shows that it will be accessible to a large number of malicious users who may attempt to use it to attack Macs.<\/p>\n<p><b>Means of protection<\/b>: Intego VirusBarrier X5 and X6 detect and eradicate this malware, which it identifies it as OSX\/HellRTS.D, with its threat filters dated April 15, 2010 or later.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware: OSX\/HellRTS.D Discovered: April 14, 2010 Risk: Low Description: Intego has discovered a new variant of a malware for Mac, called HellRTS, which, when installed on computers running Mac OS X, opens a backdoor that allows remote users to take control of infected Macs and perform actions on them. Intego identifies this backdoor as OSX\/HellRTS.D, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8763,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[30,2710,85,86,118,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Malware: OSX\/HellRTS.D Discovered: April 14, 2010 Risk: Low Description: Intego has discovered a new variant of a malware for Mac, called HellRTS, which,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs - Intego Security Memo - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Malware: OSX\/HellRTS.D Discovered: April 14, 2010 Risk: Low Description: Intego has discovered a new variant of a malware for Mac, called HellRTS, which,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-04-16T16:45:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-05T19:30:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/\",\"name\":\"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs - Intego Security Memo - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#primaryimage\"},\"datePublished\":\"2010-04-16T16:45:51+00:00\",\"dateModified\":\"2020-02-05T19:30:33+00:00\",\"description\":\"Malware: OSX\/HellRTS.D Discovered: April 14, 2010 Risk: Low Description: Intego has discovered a new variant of a malware for Mac, called HellRTS, which,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs &#8211; Intego Security Memo\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs &#8211; Intego Security Memo\",\"datePublished\":\"2010-04-16T16:45:51+00:00\",\"dateModified\":\"2020-02-05T19:30:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#webpage\"},\"wordCount\":335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"Backdoor\",\"HellRTS\",\"Macs\",\"Malware\",\"Security Memo\",\"Trojan Horse\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Malware: OSX\/HellRTS.D Discovered: April 14, 2010 Risk: Low Description: Intego has discovered a new variant of a malware for Mac, called HellRTS, which,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/","og_locale":"en_US","og_type":"article","og_title":"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs - Intego Security Memo - The Mac Security Blog","og_description":"Malware: OSX\/HellRTS.D Discovered: April 14, 2010 Risk: Low Description: Intego has discovered a new variant of a malware for Mac, called HellRTS, which,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-04-16T16:45:51+00:00","article_modified_time":"2020-02-05T19:30:33+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/","name":"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs - Intego Security Memo - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#primaryimage"},"datePublished":"2010-04-16T16:45:51+00:00","dateModified":"2020-02-05T19:30:33+00:00","description":"Malware: OSX\/HellRTS.D Discovered: April 14, 2010 Risk: Low Description: Intego has discovered a new variant of a malware for Mac, called HellRTS, which,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs &#8211; Intego Security Memo"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"HellRTS Backdoor Can Allow Malicious Remote Users to Control Macs &#8211; Intego Security Memo","datePublished":"2010-04-16T16:45:51+00:00","dateModified":"2020-02-05T19:30:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#webpage"},"wordCount":335,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["Backdoor","HellRTS","Macs","Malware","Security Memo","Trojan Horse"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-hellrts-backdoor-can-allow-malicious-remote-users-to-control-macs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ou","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1518"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1518"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1518\/revisions"}],"predecessor-version":[{"id":90993,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1518\/revisions\/90993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}