Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Cybercriminals create botnet using Mac computers
CBC Canada ^ | Wednesday, April 15, 2009

Posted on 04/15/2009 9:08:14 PM PDT by Swordmaker

Traditionally, botnets have spread through PCs running Windows, and not Macs, in part because of the low market share worldwide of computers like the iMac, shown here behind Apple CEO Steve Jobs in a 2006 photo. (Paul Sakuma/Associated Press) A piece of malicious software unwittingly shared over a peer-to-peer network in January was the key tool in what security researchers are saying was the first known attempt to create a botnet of Mac computers.

Researchers at Symantec say the Trojan, called OSX.Iservice, hid itself in pirated versions of the Apple application iWork '09 and the Mac version of Adobe Photoshop CS4 that were shared on a popular peer-to-peer bittorrent network.

Once downloaded, the applications themselves worked normally, but the Trojan opens a "back door" on the compromised computer that allows it to begin contacting other hosts in its peer-to-peer network for commands.

Researchers Mario Barcena and Alfredo Pesoli of Symantec Ireland, writing in the April 2009 issue of the Virus Bulletin, say the network of infected computers attempted to initiate a denial of service attack on a website in January.

"OSX.Iservice is an interesting piece of malware — not only does it make use of Mac OS internals, but it is also the first Mac botnet that we are aware of," they wrote.

A botnet, or robot network, is a group of linked computers — sometimes called zombies — that have been commandeered, in some instances by criminals, to perform a host of actions, from connecting and infecting other computers to sending out spam or launching distributed denial of service attacks to bring down websites or web servers.

But traditionally, botnets have spread through PCs running Windows, and not Macs, in part because of the low market share of Macs worldwide.

Apple had 7.2 per cent of personal computer market share in the United States in the fourth quarter of 2008, according to technology analyst IDC, but was not among the top five PC makers worldwide, as ranked by shipments.

Kevin Haley, director of Symantec Security Response, said cybercriminals who want to create a botnet of computers traditionally attack machines running Microsoft's Windows operating system because the goal is to have the biggest network possible.

"It's a numbers game," said Haley. "If you're going to go after the largest market, you have to go after the largest target."

An example of a particularly successful botnet is the one created by the Conficker worm, which by some estimates is believed to have spread to as many as 12 million machines.

By comparison, the iBotnet, as the Symantec researchers have dubbed it, spread to only a few thousand computers before it was identified. A number of security firms say removal of the Trojan is simple once it has been identified.

The method used to infiltrate the computers — tricking users to install a Trojan hiding in a free version of software — is also a fairly basic way to access a computer, said Haley, and is not a technique exclusive to Macs or any particular vulnerability inherent in the computer's operating system.

Haley said downloading any file from an unknown source is a potentially dangerous practice, no matter what computer a person uses.

The malicious software, or malware, is unique, however in that it only clearly targeted Mac users and also included a variation — found in the corrupted Adobe Photoshop CS4 file — that used some of the functions on the Mac OS that relate to its own authorization services interface, according to the Symantec Ireland authors.

"With malware authors showing an increasing interest in the Mac platform, we believe that more advanced [user interface] spoofing tricks may be seen in the future," they wrote.

Ryan Naraine, the security evangelist at Kaspersky Lab, said that while a Mac botnet may not be practical for criminals, the discovery of the Trojan is proof that no operating system is inherently safe.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: apple; bestcomputer; botnet; cybercriminal; cybercriminals; ilovebillgates; iwanthim; iwanthimbad; macintosh; microsoftfanboys; spamiswindows; spammer

1 posted on 04/15/2009 9:08:14 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

bookmark


2 posted on 04/15/2009 9:11:13 PM PDT by GOP Poet
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Interesting.


3 posted on 04/15/2009 9:14:44 PM PDT by KoRn (Department of Homeland Security, Certified - "Right Wing Extremist")
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Aliska; aristotleman; ...
First Apple Mac Botnet? According to Symantec researchers one attempted a Denial of Service attack in January... PING!

The malware was apparently attached to the supposedly pirated copy of the FREE download of iLife'09 update posted on a bit-torrent site... Symantec claims that "thousands" of Macs were infected by downloading and installing this Trojan, but at the time, bit-torrent records showed the single instance of an infected copy was only downloaded "dozens" of times. The file was available free on Apple's website.


Mac Botnet Ping?!

If you want on or off the Mac Ping List, Freepmail me.

4 posted on 04/15/2009 9:15:04 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
One question I have is: if this was discovered by Symantec researchers, how come it was not posted on Symantec's website—and subject of a Symantec press release? Instead, it's published in an obscure newsletter for Virus researchers, Virus Bulletin, three months after the supposed Denial of Service attack attempt. What gives?

I suspect that this "botnet" did not rise to even Symantec's low standards of important malware.

5 posted on 04/15/2009 9:29:26 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

So is the key to protect macs is to avoid illegal downloads?
It sounds like a no brainer....


6 posted on 04/15/2009 9:30:27 PM PDT by Freedom2specul8 (Please pray for our troops.... http://www.americasupportsyou.mil/)
[ Post Reply | Private Reply | To 4 | View Replies]

To: All

Oh, we can’t read the original article and see what it actually says unless we are willing to fork over $175 for a subscription... Nope, don’t think so.


7 posted on 04/15/2009 9:32:43 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker

Correction... I mis-remembered. It was not the upgrade to iLife’09, it was the Trial version of iWork’09... sorry about that.


8 posted on 04/15/2009 9:53:29 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

9 posted on 04/15/2009 9:55:38 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~

Avoid pirated software. Lesson learned.


10 posted on 04/15/2009 9:59:58 PM PDT by thecodont
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker

B.. b.. b.. but, Mac is impervious to any virus!!!!


11 posted on 04/15/2009 10:14:03 PM PDT by cybervyk
[ Post Reply | Private Reply | To 1 | View Replies]

To: cybervyk
B.. b.. b.. but, Mac is impervious to any virus!!!!

Read the article. This was a TROJAN... an application that is masquerading as something is it not... or has something added to it. It is not a virus, the definition of which which requires self-replications, self-installation, and self-transmission.

Nor has anyone here claimed that the Mac is "impervious" to a virus... but it is damned difficult to write one for it... and even harder to find a viable vector.

12 posted on 04/15/2009 10:17:41 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker

13 posted on 04/15/2009 10:18:23 PM PDT by JoeProBono (A closed mouth gathers no feet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

But, but, I thought Macs didn’t have enough marketshare to attract malware authors.


14 posted on 04/16/2009 9:01:13 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

So I wonder how many PC viruses over the years were created by MAC geeks trying to make Microsoft look bad.


15 posted on 04/16/2009 9:06:22 AM PDT by McGruff (I guess it all depends upon what the meaning of "bow" is.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All
I suspect that this "botnet" did not rise to even Symantec's low standards of important malware.

Symantec on OSX.Iservice:

Wild Level: Low
Number of Infections: 0 - 49
Number of Sites: 0 - 2
Geographical Distribution: Low
Threat Containment: Easy
Removal: Easy
Damage Level: Medium
Payload: Opens a back door on the compromised computer.
Distribution Level: Low

Yep, it's not serious at all... it's FUD!

16 posted on 04/17/2009 6:45:34 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 5 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson