Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

UPDATED: Symantec researchers issues first Mac botnet malware warning
9 to 5 Mac ^ | 10/1/2009 | Jonny Evans

Posted on 10/01/2009 11:05:22 AM PDT by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-42 next last
To: Swordmaker

I didn’t even know I had something called root. And I now am beginning to seriously doubt that “The Opera Gala: Live from Baden-Baden (2007)” was one of the infected downloads. Oh well. Better the DVD.


21 posted on 10/01/2009 2:48:29 PM PDT by La Lydia
[ Post Reply | Private Reply | To 20 | View Replies]

To: Swordmaker
Image Hosted by ImageShack.us
22 posted on 10/01/2009 3:01:34 PM PDT by vox_freedom (America is being tested as never before in its history. May God help us.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: La Lydia
I didn’t even know I had something called root.

I hope you get over it real soon. lol

23 posted on 10/01/2009 3:02:33 PM PDT by vox_freedom (America is being tested as never before in its history. May God help us.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: vox_freedom

“My toof hurts!”


24 posted on 10/01/2009 3:06:11 PM PDT by La Lydia
[ Post Reply | Private Reply | To 23 | View Replies]

To: La Lydia

If you don’t know whether you are you probably aren’t!


25 posted on 10/01/2009 6:21:41 PM PDT by Mind-numbed Robot (Not all that needs to be done needs to be done by the government)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Swordmaker
> ...you'd ALSO have to be stupidly running in Root which is not activated in the default install of OS X. Far less than 1/10 of one percent of Mac users have activated a root account. Even fewer will routinely run in root.

1. The malware checks to see if it's running as root, meaning euid=0 (effective uid). This is easily accomplished by any Mac user who set up their own machine, because you don't have to "activate the root account" to do it.

"sudo" is available to all members of group "admin", and the default install user is made a member of group admin so they can administer their own machine. As you know, if you run sudo from the commandline, it requests your password and then runs the command that follows, as root (euid=0). I expect that the well-known installation gui-dialog prompt for password is exactly the same mechanism -- allowing the current user to elevate to root privilege by doing a setuid of 0.

It does NOT require activating the user account called "root".

2. You mean "run as root", not "run in root".

26 posted on 10/01/2009 6:49:44 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 20 | View Replies]

To: dayglored
2. You mean "run as root", not "run in root".

True.

27 posted on 10/01/2009 10:47:59 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 26 | View Replies]

To: Wright Wing

Not really. The virus here can be done easily on any machine that someone idiot is willing to steal programs and install them not knowing if they had a virus or not.

The talking point you are referring to is being able to attack a Mac over the wire without the need of a user installing a trojan. And that was already defeated with the first version of Mac OS X when the man in the middle attack was found to be viable against their update website.

Once again Mac is just too small a footprint to worry about.


28 posted on 10/02/2009 7:25:05 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 16 | View Replies]

To: for-q-clinton

This isn’t a virus but a trojan.

Once again, if the footprint is so small, all someone needs to do is write one virus that affects OS X for all to see. Then you can continue with the nonsensical argument that the Mac “footprint” is too small. How many millions of Macs will it take?

Give us a number or continue to move the goal post.


29 posted on 10/02/2009 7:39:12 AM PDT by Wright Wing
[ Post Reply | Private Reply | To 28 | View Replies]

To: Wright Wing

I’ll give a number 20% of the user base. Then it might actually get some attention.


30 posted on 10/02/2009 9:41:22 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 29 | View Replies]

To: antiRepublicrat

Microsoft today just announced FREE Anti-virus software they have had in beta for years. Now all these anti virus folks are going to go bye bye.


31 posted on 10/02/2009 2:26:25 PM PDT by RachelFaith (PALIN 2012 - "As if it actually matters any more")
[ Post Reply | Private Reply | To 19 | View Replies]

To: for-q-clinton; right wing
The talking point you are referring to is being able to attack a Mac over the wire without the need of a user installing a trojan. And that was already defeated with the first version of Mac OS X when the man in the middle attack was found to be viable against their update website.

It was viable, but only for a malicious server on your own LAN masquerading as Apple's server. No Mac user ever was attacked in such a way. That unexploited vulnerability was closed seven years ago.

32 posted on 10/02/2009 3:41:00 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 28 | View Replies]

To: Swordmaker

so. Point is it was a viable attack vector so the point is moot—meaning it’s already been done. The fact it didn’t occur in the wild see the previous posts about it being a waste of time to attack such a small percentage of machines.


33 posted on 10/02/2009 4:49:29 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 32 | View Replies]

To: for-q-clinton; antiRepublicrat
so. Point is it was a viable attack vector so the point is moot—meaning it’s already been done. The fact it didn’t occur in the wild see the previous posts about it being a waste of time to attack such a small percentage of machines.

You really don't know what you are talking about, for-q-Clinton. I agreed it was a viable vulnerability but I did not agree that it was a viable vector. For this to work your your local area network had to already be compromised. It was a vulnerability in the early versions of OS X that was first announced by Apple when it fixed the problem. It was never exploited, nor was the possibility of it being exploited very credible, given the extreme difficulty of placing a spoofed server on a LAN.

In other words, it hasn't "already been done." This was not even a "proof-of-concept" demonstration as it was not demonstrated, merely closed.

Every vulnerability has the potential to be exploited but some are almost impossible. This man-in-the-middle attack is not a means of attacking thousands of computers, it was a retail hacking trick.

Attacking computers with malware is not a matter of percentages of all computers, for-q; it's a matter of sheer numbers. With the upcoming announcement of Apple selling more than ten million Macs this fiscal year, the sheer number of un-protected Macs out there in the wild is somewhere north of 45 million. Viruses have been written targeting just 12,000 vulnerable Windows XP computers protected by BlackIce's firewall. Others were written aimed at fewer than 30,000 smart cell phones and there was even a virus written that targeted the dozens of iPods that had been converted to run Linux, so why are the crackers and virus authors NOT writing malware for the potentially lucrative target of 45 million sitting ducks? There is a reason, but it isn't obscurity.

34 posted on 10/02/2009 7:04:09 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Swordmaker

Oh I see you dont’ deal with big enough customers or government business to understand how this was/is a significant point of attack.

Yes there are huge risks with that point of attack, but you’re right if you’re a home user it’s doubtful that it will be exploited. But if a government was using Mac OS X at that point they would be vulnerable.


35 posted on 10/03/2009 5:58:09 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Swordmaker

Nenernenernener..... Warning! Warning! Danger Will Robinson!!! The Sky is falling!!!

All your base are belong to us!!! Somebody sent us up the bomb!


36 posted on 10/03/2009 2:26:00 PM PDT by TheBattman (Pray for our country...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: for-q-clinton

10 million new macs sold in Apple’s fiscal year, add to that the fact that the OS has been out in some form for 7 years - and how many millions of OSX machines are now online? Even if we said 45 million, would that not be an attractive target, since 99.9997% believe their machines are essentially virus and trojan-proof and thus run no form of antivirus?

That is why the “obscurity” argument just doesn’t fly...


37 posted on 10/03/2009 2:32:23 PM PDT by TheBattman (Pray for our country...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Wright Wing

It might be the first time, but a second time... then it isn’t the first!


38 posted on 10/03/2009 2:33:07 PM PDT by TheBattman (Pray for our country...)
[ Post Reply | Private Reply | To 16 | View Replies]

To: for-q-clinton
In other words - if you are going to pirate software, then you should be sure to buy steal some antivirus software as well...
39 posted on 10/03/2009 2:38:50 PM PDT by TheBattman (Pray for our country...)
[ Post Reply | Private Reply | To 28 | View Replies]

To: for-q-clinton; Wright Wing; antiRepublicrat; TheBattman; RachelFaith; dayglored; Sparko; ...
Oh I see you dont’ deal with big enough customers or government business to understand how this was/is a significant point of attack.

Yes there are huge risks with that point of attack, but you’re right if you’re a home user it’s doubtful that it will be exploited. But if a government was using Mac OS X at that point they would be vulnerable.

Why are you crowing about a mere "speck" in the eye of OS X, while ignoring the multiple "logs" in your own preferred platform's eyes, for-q?

I fully understand it was a potential point of attack with "huge risks"—there have been thousands of such potential points of attack on Windows—but I also understand that this one for OS X was never exploited. I also understand that such an exploit depended on the existence of an already compromised—by some other means—computer on the local area network where the targeted computers are connected before it could have been a danger. I also completely understand that this so-called "significant point of attack" was in a very early version of a developing technology and that the vulnerability was present only for a very short time before it was pro-actively CLOSED, SEALED SHUT, ENDED by Apple soon after it was discovered, before it was ever known about by anyone who could have exploited it.

The point is, for-q, Apple added digital security signature technology to all of its Software Update packages to prevent a success of man-in-the-middle attacks using this means of attack. That preventive measure is something not done by Microsoft for Windows Update until at least a year after Apple did it.

Shall we discuss some of the "logs" in Windows eyes? Shall we talk about all the "significant points" of attacks that existed in every version of Windows of the past, for-q? Ones that were actually exploited... for example, the vulnerabilities used by the various versions of the Conficker/downadup/kido worm that did indeed infect thousands of military and government computers this past year?

Are you aware, for-q, after Apple had closed the vulnerability you are claiming "has already been done" implying to readers of this thread that the mere existence of the vulnerability means that it WAS exploited and that the Mac has been infected with malware, that the man-in-the-middle attack WAS used by crackers to intercept update requests from Windows' users and infect those users' computers?

You, with your claim "that it has already been done," are apparently incapable of understanding the difference between a potential vulnerability and a real world, out-in-the-wild, exploit doing actual damage.

40 posted on 10/03/2009 6:17:08 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 35 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-42 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson