Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

iWork '09 trojan infects at least 20,000 machines
Engadget.com ^ | 1/22/09 | Joseph L Flatley

Posted on 01/22/2009 2:50:02 PM PST by dangerdoc

Quite a number of no-googniks who thought they'd safe a few bucks by downloading a pirated version of iWork 09 have gotten more than they'd bargained for, in the form of a Trojan Horse called OSX.Trojan.IServices.A This guy installs itself in the computer's startup as root, and once in place can connect to a remote server and broadcast its location, allowing malicious users to take charge of the machine remotely. An since it has root access to the OS, the trojan can not only install additional components but can also modify existing apps, making this thing extremely difficult to remove.

(Excerpt) Read more at engadget.com ...


TOPICS: News/Current Events
KEYWORDS: apple
Navigation: use the links below to view more comments.
first 1-2021-4041-43 next last
I'm assuming the trial from Apple is safe.
1 posted on 01/22/2009 2:50:02 PM PST by dangerdoc
[ Post Reply | Private Reply | View Replies]

To: dangerdoc

I think the OEM version should be OK.


2 posted on 01/22/2009 2:52:21 PM PST by Keith in Iowa (ESPN MNF: 3 Putzes talking about football on TV while I'm trying to watch a game.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dangerdoc

I’m on a MacBook now. Interesting to see an Apple get hacked...


3 posted on 01/22/2009 2:54:49 PM PST by devane617 (Republican's first strategy should be taking over the MSM. Without it we are doomed.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dangerdoc

Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??
WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?


4 posted on 01/22/2009 3:02:34 PM PST by ClearBlueSky (Whenever someone says it's not about Islam-it's about Islam. Jesus loves you, Allah wants you dead!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ClearBlueSky

Same reason a dog licks itself.


5 posted on 01/22/2009 3:04:16 PM PST by null and void (We are now in the third day of our national holiday from reality.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker

Idiots downloading infested pirated apps ping.


6 posted on 01/22/2009 3:05:14 PM PST by antiRepublicrat ("I am a firm believer that there are not two sides to every issue..." -- Arianna Huffington)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ClearBlueSky
"Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY?? WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?"

The simple straight answer is, because they can. As stupid as that may sound, they actually get a feather in their cap and are considered "elite" among their peers for doing it. It's a rather hedonistic attitude, but it is what it is.

7 posted on 01/22/2009 3:06:26 PM PST by DaGman
[ Post Reply | Private Reply | To 4 | View Replies]

To: Keith in Iowa

Yeah, if you buy it legally, it should be fine.


8 posted on 01/22/2009 3:06:38 PM PST by rwfromkansas ("Carve your name on hearts, not marble." - C.H. Spurgeon)
[ Post Reply | Private Reply | To 2 | View Replies]

To: devane617
I’m on a MacBook now. Interesting to see an Apple get hacked...
It's not an exploit so much as social engineering.
9 posted on 01/22/2009 3:08:15 PM PST by ketsu (ItÂ’s not a campaign. ItÂ’s a taxpayer-funded farewell tour.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ClearBlueSky

Once a trojan is in place on your computer, they can remotely access it and program it to do whatever they want. Send spam, launch an attack against other computers, search for anything on your computer that looks like a credit card number or userids and passwords, or watch for you to open particular web sites, like online banking sites, and record the keystrokes you enter when you log in and send them the information.


10 posted on 01/22/2009 3:09:13 PM PST by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ClearBlueSky
Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY?? WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?
Look up the economics of malware. Trojans like this one can make *millions* for their creator, you can use them to steal credit cards, send spam(which is $$$$$$ believe it or not) etc...
11 posted on 01/22/2009 3:11:46 PM PST by ketsu (ItÂ’s not a campaign. ItÂ’s a taxpayer-funded farewell tour.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ClearBlueSky
Can someone ‘splain it to me?

Money. The trojans are used for spam and DDOS extortion botnets. Something like this requires no talent though. Just slip a standard botnet script into the iWork installer.

Other cracks that take much more talent to pull off are usually done either for money or to improve the reputation of the cracker in the community, or both. The skilled hacker community looks down on simplistic trojans such as this. Only script kiddies (bored, relatively talentless, malicious kids -- the modern vandalism) and organized crime think this is cool.

12 posted on 01/22/2009 3:17:13 PM PST by antiRepublicrat ("I am a firm believer that there are not two sides to every issue..." -- Arianna Huffington)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ClearBlueSky
Keyloggers can identify which bank website you log into and record your name and SN, so some of it is profit motive. Also, I knew one guy who got a visit from the FBI. His computer was being used as a server for child porn web sites. FBI confirmed the guy didn't even know it was on his computer. Trojan infection, remote access, use the guy's computer for any illegal activity you wish, and you've left no footprints authorities can follow.

And, as Alfred put it in the Dark Knight, "Some men just want to see the world burn."

13 posted on 01/22/2009 3:19:38 PM PST by Richard Kimball (We're all criminals. They just haven't figured out what some of us have done yet.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ClearBlueSky
Just to add a bit to tacticalogic's excellent reply my recent experience is that they also use compromised computers to engage in "referrer spam" which, while a problem for some time, seems to be getting worse.

In a nutshell some search engines look at the number of links to a site as one measure of popularity. Bot, or zombie machines will go around hitting sites with info that they were referred by a particular site and that site is shown in web and blog logs as a referrer and points back to that site. Bingo, that referring site gets a gold star from the search engine.

To a lesser degree some people sell "traffic". This traffic can cause a site to make money from ad impressions and improve their traffic ranking. Again zombie machines are commonly used for purchased traffic.

It's just a money making thing, they could care less about the Internet. Twenty years ago it would have been some other scam, now it's just easier since they can do it on a large scale for very little investment.

Think of spam. Who in their right mind would click on spam and actually give a strange site money? Very, very few people but spammers can send out a million emails for next to nothing and if they get just one hit they're ahead.

14 posted on 01/22/2009 3:19:38 PM PST by Proud_texan (Scare people enough and they'll do anything.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ClearBlueSky

“Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??
WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?”

DEMOCRATS LOL


15 posted on 01/22/2009 3:23:46 PM PST by blueyon (Every one will have their 15 mins under the bus)
[ Post Reply | Private Reply | To 4 | View Replies]

To: nnn0jeh

ping


16 posted on 01/22/2009 3:24:53 PM PST by kalee (01/20/13 The end of an error.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dangerdoc
I'm assuming the trial from Apple is safe.

Perhaps. Depends on the nature of what they hacked in the pirated version, and if they can find a way to apply their trojan in a way that does not involve a full download.

One thing this event helps to point out, is the potential dangers of open-source software. Yes, this trojan was placed into "pirated" software, but it could as easily have been placed in something open-source, and downloaded by its victims on that basis.

If the hackers are content to achieve a series of "occasional infections," similar to what happened here, then providing links to their own versions of open-source software can provide that access.

17 posted on 01/22/2009 3:39:22 PM PST by r9etb
[ Post Reply | Private Reply | To 1 | View Replies]

To: r9etb
....but it could as easily have been placed in something open-source, and downloaded by its victims on that basis.

Does this only apply to downloaded executable programs, or does it also apply to picture downloads - like from YouTube & picture files?

18 posted on 01/22/2009 4:25:16 PM PST by ghostrider
[ Post Reply | Private Reply | To 17 | View Replies]

To: ClearBlueSky

“Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??”

After they get your account number and password, they can loot your bank and brokerage accounts via wire transfers. If you don’t look at your account regularly and don’t get paper statements, the money could be gone before you notice it. A pickpocket can steal your wallet - these people can steal every dime you own in an online-accessible account.


19 posted on 01/22/2009 4:42:40 PM PST by Zhang Fei
[ Post Reply | Private Reply | To 4 | View Replies]

To: ClearBlueSky

Other than the reasons already mentioned; some of these people (the really good ones) can actually make a legitimate living with their “Black Hat’ knowledge. Either by consulting with companies on security procedures, and/or writing things to test new detection algorithms, or reverse engineering and backtracing existing ones in the wild. That’s the “White Hat” side of the same coin.


20 posted on 01/22/2009 4:52:03 PM PST by AFreeBird
[ Post Reply | Private Reply | To 4 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-43 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson