Threat Assessment
Wild
Wild Level: Low
Number of Infections: 0 - 49
Number of Sites: 0 - 2
Geographical Distribution: Low
Threat Containment: Easy
Removal: Easy
16% of 0-49 infections = a maximum of eight Macs. My hypothesis is that those infected Macs were running Windows in boot camp. As described in the technical details on the Symantec site, Jnanabot only affects Windows; it infects a system by writing to the registry and downloading and installing several .exe files. The numbers in that pie chart are "from artifacts of the file system."
At the time of the article (~5 months old), the folks at Symantec said the number of Jnanabot infections so far is measured in the thousands.. What you are looking at is the state of trojan 5 months later, after it has been detected and removed from many systems.
http://www.symantec.com/connect/blogs/trojanjnanabot-trojanaffecting-multiple-platforms
This particular Trojan (that Symantec detects as Trojan.Jnanabot) is one such attempt to target multiple platforms. Jnanabot has numerous functionalities that include key logging, connection to IRC servers, and posting malicious links on social networking sites, affecting users on Windows, Mac OSX, and Linux platforms.
The threat is composed of multiple files. I will address them as components throughout this blog. Each component is meant for a specific task. Some components are compiled Java files whereas others are platform specific executable files.
- Library component: Contains Library files needed to run the threat on various platforms namely: Mac OSX, Linux with AMD 64 machines, Linux with x86 machines, Windows with x86 machines
- Main component: The main .jar file that controls execution of all the components.
- Install/update component: Installs and updates the threat.
- IRC component:Connects to remote IRCs and waits for further commands from the master.
- Key logging component.
- Crypt component: Windows and Mac executable files to decrypt the packaged files.
- Facebook component: We are currently analyzing this component. From our brief analysis it seems as if the threat can read cookies of logged on user and may post malicious links on the social networking site.