Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

New Mac OS X Trojan unearthed. Call it SabPub
CNET ^ | April 16, 2012 | Don Reisinger

Posted on 04/16/2012 9:00:32 PM PDT by iowamark

Here we go again.

Kaspersky Lab security researcher Costin Raiu has discovered another Mac OS X Trojan. Dubbed Backdoor.OSX.SabPub.a (or just SabPub, for short), the malware uses Java exploits to infect a Mac, connect to a remote Web site, and wait for instructions that include taking screenshots of the user's Mac and executing commands.

"The Java exploits appear to be pretty standard, however, (and) they have been obfuscated using ZelixKlassMaster, a flexible and quite powerful Java obfuscator," Raiu wrote on the Securelist blog. "This was obviously done in order to avoid detection from anti-malware products." Related stories

Raiu's discovery comes as Mac users are on high alert over the Flashback Trojan, which reportedly infected over 600,000 Macs worldwide. That exploit, which also uses Java, is capable of nabbing user passwords and other information from their Web browser or some applications. Apple on Friday released a tool designed to remove Flashback from infected machines. Prior to that launch, it was believed that 270,000 Macs were infected with the Trojan, down significantly from its height.

In a follow-up post on Securelist yesterday, Raiu provided a bit more information on SabPub to help differentiate it from Flashback. He reported that there are at least two SabPub variants in the wild today, including one that dates back to February. The malware appears to be delivered through targeted attacks, which should limit its ability to make widespread incursions a la Flashback.

Raiu also reported that the malware appears to be spreading through Word documents that exploit the CVE-2009-0563 vulnerability related to a stack-based buffer overflow in Office on the Mac.

"The most interesting thing here is the history of the second SabPub variant. In our virus collection, it is named '8958.doc.'" Raiu wrote on the blog. "This suggests it was extracted from a Word document or was distributed as a Doc-file."

Apple did not immediately respond to CNET's request for comment.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: apple; mac; sabpub
Navigation: use the links below to view more comments.
first previous 1-2021-4041 next last
To: iowamark

It looks like the Apple is starting to get worms. I guess it’s becoming time to pitch the Apple and get PCs which have much more mature and developed exploit removal tools.


21 posted on 04/17/2012 5:21:04 AM PDT by norwaypinesavage (Galileo: In science, the authority of a thousand is not worth the humble reasoning of one individual)
[ Post Reply | Private Reply | To 1 | View Replies]

To: norwaypinesavage

“It looks like the Apple is starting to get worms. I guess it’s becoming time to pitch the Apple and get PCs which have much more mature and developed exploit removal tools.”

There’s a saying about that: “It’s like cutting off your nose to spite your face!”

It’s funny watching each release of Windows add the same things that earlier releases of MacOS had. I hear Windows 8 is going to have a backup system. Just imagine!


22 posted on 04/17/2012 5:30:28 AM PDT by PreciousLiberty (Pray for America!!!)
[ Post Reply | Private Reply | To 21 | View Replies]

To: PreciousLiberty

You know that’s a lie. A fully patched windows machine is secure.


23 posted on 04/17/2012 5:31:37 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 20 | View Replies]

To: for-q-clinton

“You know that’s a lie. A fully patched windows machine is secure.”

You apparently don’t know that you’re uninformed. Do a search on “zero day exploit”.

Guess which OS gets vastly more of them?


24 posted on 04/17/2012 5:42:08 AM PDT by PreciousLiberty (Pray for America!!!)
[ Post Reply | Private Reply | To 23 | View Replies]

To: PreciousLiberty

I’ll steal a page from Swordmaker. There are no 0 day exploits in the wild for a fully patched windows7 machine.

If there is prove it. I will navigate my windows 7 machine to any website you want me to.


25 posted on 04/17/2012 6:49:26 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Swordmaker
Thanks for the clarity.

The pc-shills have been screaming
this in every news venue.


26 posted on 04/17/2012 7:39:00 AM PDT by Uri’el-2012 (Psalm 119:174 I long for Your salvation, YHvH, Your law is my delight.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: for-q-clinton

“If there is prove it. I will navigate my windows 7 machine to any website you want me to.”

The first phase of a zero day exploit is one nobody knows about - like the Flashback malware before people were aware of it. That is how hundreds of thousands or millions of machines become infected.

Good luck with Windows. As for me, I will continue to enjoy the painless and productive MacOS - along with its best in class bundled applications.


27 posted on 04/17/2012 7:56:22 AM PDT by PreciousLiberty (Pray for America!!!)
[ Post Reply | Private Reply | To 25 | View Replies]

To: PreciousLiberty

I’m not saying OSx is garbage, all I’m saying is the security of both OSX and windows 7 is about the same. OSX enjoys the benefit of having a smaller user base so the target is smaller. But as it becomes more popular we will see more and more attacks on OSX.

So all I’m saying is get ahead of the game and apply a good 3rd party AV solution to your system to help protect your data.


28 posted on 04/17/2012 2:55:59 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 27 | View Replies]

Comment #29 Removed by Moderator

To: Yehuda

That is not a lie. It is being torn up with java malware. When you go from having 0 to hundreds of thousands of cases that’s being torn up.


30 posted on 04/17/2012 5:03:10 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 29 | View Replies]

To: for-q-clinton
I’ll steal a page from Swordmaker. There are no 0 day exploits in the wild for a fully patched windows7 machine.

If there is prove it. I will navigate my windows 7 machine to any website you want me to.

There HAVE been... several. They are now patched.

31 posted on 04/17/2012 6:23:30 PM PDT by Swordmaker
[ Post Reply | Private Reply | To 25 | View Replies]

To: Swordmaker

To use your logic. I’ve never been hit nor anyone I know that was running a fully patched windows 7 machine—therefore it does not exist.

Kind of like the recent malware on OSX.


32 posted on 04/18/2012 7:30:38 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 31 | View Replies]

Comment #33 Removed by Moderator

To: Yehuda

The OS should NOT allow an application to be exploited like that. Microsoft has been beaten up for years over such things.


34 posted on 04/18/2012 12:37:46 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Swordmaker

Thank you for all you do. I’ve no other source for straight skinny as good as yours.


35 posted on 04/18/2012 12:52:39 PM PDT by Sundog (When Hollywood defines reality there is none.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: for-q-clinton

It doesn’t. The data stacks and heaps are non-executeable memory locations in OSX. Microsoft was apparently doing something that is not permitted under the system programming that moved data into executable areas. This was patched THREE YEARS AGO. It is not in the wild as far as I can see. It’s theoretical, again, if you haven’t updated your MS Word, or your Mac, you might get hit by this.


36 posted on 04/18/2012 3:06:58 PM PDT by Swordmaker
[ Post Reply | Private Reply | To 34 | View Replies]

To: Swordmaker

How does Microsoft do something that isn’t permitted? The OS controls that stuff. The app should just crash when that happens or not be allowed to be compiled/installed. Or at least warn the user that the app they are installing is altering the OS at ring0.


37 posted on 04/18/2012 3:23:54 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 36 | View Replies]

Comment #38 Removed by Moderator

To: Yehuda

Uh actually the reason I’m doing this service of posting in Mac threads is because for years we had knuckleheads post in windows threads to get a Mac. I’m not even say to go back to windows. I’m just saying get a real AV solution and use good security practices because no OS is fool-proof.

Also you are RIGHT I’m not one of those guys that say Apple has too much control of the apps. I hate android and that’s one of their biggest issues—did you see the instagram malware for android? Why on earth would you even bring this up on this thread? Are you a macbot or apple zealot?


39 posted on 04/19/2012 11:48:15 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 38 | View Replies]

Comment #40 Removed by Moderator


Navigation: use the links below to view more comments.
first previous 1-2021-4041 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson