The Mac trojan can leverage existing user permissions to quietly perform malicious activities before deleting the evidence to cover its tracks.

from Top Tech News- News18.com https://ift.tt/hUdXQqt