Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Two new pieces of Mac malware surface—New worm and Trojan attack the Mac user
vnunet.com ^ | 11 Jun 2009 | Iain Thomson

Posted on 06/10/2009 10:02:05 PM PDT by Swordmaker

Two new pieces of malware for Apple computers have been found in the wild according to security firm Sophos.

The first, Tored-Fam, is a worm that spreads via email attachments and is simply a variant on the well known Tored family of malware that has been in circulation since last year. [NEW? Not by a long shot!—Swordmaler] The worm collects email addresses and attempts to forward itself on.

Analysis if the worm’s source code by Sophos suggests it is being used to build a Mac botnet dubbed Raedbot. This is being assembled by a malware writer dubbed Ag_Raed, who is based in Tunisia.

The second piece of malware is a Trojan called Jahlav-C which is embedded in an apparent pornography site online. It masquerades as an Activex video codec that needs to be downloaded in order to run the site’s content.

“I've got a theory that although many people are undoubtedly buying Apple computers because they're beautifully designed and well-marketed, there will also be some people who have dumped Windows because they are fed up with all of the spyware, pop-ups and virus attacks," said Graham Cluley, senior technology consultant for Sophos.

“Indeed, some of the people who may well have suffered a lot from those kind of attacks in the past may be exactly the same kind of folk who visit the grubbier areas of the internet in the wee small hours of the morning. And they may feel that one of the side benefits of switching to a Mac is that they now don't have to worry about all of those nasty things while they're err.. watching nasty things.”

A video of the Jahlav-C attack can be seen here.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: apple; fud; macmalware; security
FUD!

Actually, neither of these is new... this is rehashed FUD about a well known Trojan Horse masquerading as a Video Codex (from early 2008) and the Tored-Fam was first observed in January... where it was attached to a "pirated" version of a FREE Beta (one that could be safely downloaded from Apple) of iWork'09 on two bit-torrent sites which reported that the downloads of the infected file were in "the dozens."

Although the two self pro-discoverers of the purpose of the imbedded malware—a couple of Symantec security wonks who did not even report their finding to their own employer, choosing instead to publish in The Virus Bulletin, an obscure $150/year subscription Blog—claimed in late May that the botnet was over 20,000 Macs large, no one has independently found an infected member of this Mac Raedbot in the wild. Even Symantec reports the threat as infecting 0-50 computers. Probably true because it includes the number ZERO.

Both require social engineering to trick the user into downloading them and installing them, giving administrator name and password, and ignoring warnings that the file is an executable.

1 posted on 06/10/2009 10:02:06 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Aliska; aristotleman; ...
The first wave if post WWDC FUD is being presented... here is an example. The article claims NEW MALWARE but then only talks about already known trojan horse programs from 2008 and January 2009.

Mac FUD Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 06/10/2009 10:05:12 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Yeah, I was getting an odd sense of deja vu from this article. It seemed like old (and I mean really old) news.

And once again, you cannot infect a Mac just by connecting it to the Internet. You most assuredly can do so with (ahem) you-know-what OS— within minutes, in fact.


3 posted on 06/10/2009 10:06:40 PM PDT by RightOnTheLeftCoast (1st call: Abbas. 1st interview: Al Arabiya. 1st energy decision: halt drilling in UT. Arabs 1st!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

“. . . two self pro-discoverers . . .” should read “. . . two self pro-claimed discoverers . . . “


4 posted on 06/10/2009 10:07:04 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

AGGH! Make that “. . . self-proclaimed...”


5 posted on 06/10/2009 10:07:46 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker
100% of the live (in-the-wild) Mac malware, and a large percentage of the live Windows malware, attack a vulnerability known as the USER.

0% of the Mac malware, and a large percentage of the Windows malware, attack a vulnerability known as the OPERATING SYSTEM.

That is, Windows, the OS, can be attacked without the USER doing anything. Mac OS cannot.

I am unaware of any Mac malware that does not require some action on the part of the USER to approve and permit the attack -- consciously.

That's a big difference. Tech writers are, as a group, ignorant asses when it comes to this sort of thing.

6 posted on 06/10/2009 10:23:26 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Have you seen the Sophos videos on YouTube that supposedly show Malware in the wild infecting (or trying to but valiantly stopped by Sophos AntiVirus!!!)?

And who put together the supposed infecting web site?


7 posted on 06/10/2009 10:35:19 PM PDT by TheBattman (Pray for our country...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

bookmark


8 posted on 06/10/2009 11:51:04 PM PDT by GOP Poet
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheBattman
And who put together the supposed infecting web site?

Uh, Sophos?

9 posted on 06/10/2009 11:55:56 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker

Of course it is old recycled FUD! Ad revenue is down so they had to dig up something eye catching and found this old stinking garbage.


10 posted on 06/11/2009 6:28:25 AM PDT by Kitsunebi
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
“Indeed, some of the people who may well have suffered a lot from those kind of attacks in the past [previous windows users] may be exactly the same kind of folk who visit the grubbier areas of the internet in the wee small hours of the morning. And they may feel that one of the side benefits of switching to a Mac is that they now don't have to worry about all of those nasty things while they're err.. watching nasty things.

OMG! So now the Mac users who view "nasty things" are the ones who were previous Windows users......UGH...the snobbery in that statement is utterly sickening.

11 posted on 06/11/2009 6:35:16 AM PDT by American_Centurion (No, I don't trust the government to automatically do the right thing.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

It boggles the imagination to think that individuals sit at a computer terminal (probably in their mom’s basement) with the sole goal of doing harm to others.

They are too cowardly to “bully” face to face, so they do it that way. Public execution, anyone?


12 posted on 06/11/2009 6:57:08 AM PDT by JimRed ("Hey, hey, Teddy K., how many girls did you drown today?" TERM LIMITS, NOW AND FOREVER!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JimRed

Computer “zombies” and “botnets” are big business for various criminal groups. The people creating these things are not social misfits, they are professional criminals.


13 posted on 06/11/2009 7:11:16 AM PDT by Little Ray (Do we have a Plan B?)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Swordmaker
Thanks Swordmaker for the
Image Hosted by ImageShack.us!

14 posted on 06/11/2009 7:17:32 AM PDT by vox_freedom (global cooling is upon us)
[ Post Reply | Private Reply | To 2 | View Replies]

To: American_Centurion
“Indeed, some of the people who may well have suffered a lot from those kind of attacks in the past [previous windows users] may be exactly the same kind of folk who visit the grubbier areas of the internet in the wee small hours of the morning. And they may feel that one of the side benefits of switching to a Mac is that they now don't have to worry about all of those nasty things while they're err.. watching nasty things.”
So now the Mac users who view "nasty things" are the ones who were previous Windows users......UGH...the snobbery in that statement is utterly sickening.

users......UGH...the snobbery in that statement is utterly sickening.

On further review, I don't see how this could be refuted; no matter how much it insinuates it actually says very little. I have been suckered by a phishing attack via a preacher who suckered for it and passed it on in good faith. And what was the bait of the attack? Precisely the paranoia that anyone feels if they have ever had any suspicion (never mind the reality) that their computer was infected.

So I don't see the need to feel embarrassment over being counted among those who avoid being vulnerable to viruses.


15 posted on 06/11/2009 1:14:30 PM PDT by conservatism_IS_compassion (The conceit of journalistic objectivity is profoundly subversive of democratic principle.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: dayglored
100% of the live (in-the-wild) Mac malware, and a large percentage of the live Windows malware, attack a vulnerability known as the USER.

My favorite tech support acronym: PEBCAK. Problem Exists Between Chair And Keyboard.

16 posted on 06/11/2009 7:48:54 PM PDT by ReignOfError
[ Post Reply | Private Reply | To 6 | View Replies]

To: ReignOfError
My favorite tech support acronym: PEBCAK. Problem Exists Between Chair And Keyboard.

Frequently known as the ID 10 T problem.

17 posted on 06/11/2009 9:32:04 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 16 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson