Posted on 01/22/2009 2:50:02 PM PST by dangerdoc
Quite a number of no-googniks who thought they'd safe a few bucks by downloading a pirated version of iWork 09 have gotten more than they'd bargained for, in the form of a Trojan Horse called OSX.Trojan.IServices.A This guy installs itself in the computer's startup as root, and once in place can connect to a remote server and broadcast its location, allowing malicious users to take charge of the machine remotely. An since it has root access to the OS, the trojan can not only install additional components but can also modify existing apps, making this thing extremely difficult to remove.
(Excerpt) Read more at engadget.com ...
I think the OEM version should be OK.
I’m on a MacBook now. Interesting to see an Apple get hacked...
Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??
WHY would people spend so much time and talent creating these things to destroy the property of people they don’t even know. Is there money in it? What’s the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone ‘splain it to me?
Same reason a dog licks itself.
Idiots downloading infested pirated apps ping.
The simple straight answer is, because they can. As stupid as that may sound, they actually get a feather in their cap and are considered "elite" among their peers for doing it. It's a rather hedonistic attitude, but it is what it is.
Yeah, if you buy it legally, it should be fine.
Im on a MacBook now. Interesting to see an Apple get hacked...It's not an exploit so much as social engineering.
Once a trojan is in place on your computer, they can remotely access it and program it to do whatever they want. Send spam, launch an attack against other computers, search for anything on your computer that looks like a credit card number or userids and passwords, or watch for you to open particular web sites, like online banking sites, and record the keystrokes you enter when you log in and send them the information.
Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY?? WHY would people spend so much time and talent creating these things to destroy the property of people they dont even know. Is there money in it? Whats the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone splain it to me?Look up the economics of malware. Trojans like this one can make *millions* for their creator, you can use them to steal credit cards, send spam(which is $$$$$$ believe it or not) etc...
Money. The trojans are used for spam and DDOS extortion botnets. Something like this requires no talent though. Just slip a standard botnet script into the iWork installer.
Other cracks that take much more talent to pull off are usually done either for money or to improve the reputation of the cracker in the community, or both. The skilled hacker community looks down on simplistic trojans such as this. Only script kiddies (bored, relatively talentless, malicious kids -- the modern vandalism) and organized crime think this is cool.
And, as Alfred put it in the Dark Knight, "Some men just want to see the world burn."
In a nutshell some search engines look at the number of links to a site as one measure of popularity. Bot, or zombie machines will go around hitting sites with info that they were referred by a particular site and that site is shown in web and blog logs as a referrer and points back to that site. Bingo, that referring site gets a gold star from the search engine.
To a lesser degree some people sell "traffic". This traffic can cause a site to make money from ad impressions and improve their traffic ranking. Again zombie machines are commonly used for purchased traffic.
It's just a money making thing, they could care less about the Internet. Twenty years ago it would have been some other scam, now it's just easier since they can do it on a large scale for very little investment.
Think of spam. Who in their right mind would click on spam and actually give a strange site money? Very, very few people but spammers can send out a million emails for next to nothing and if they get just one hit they're ahead.
“Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??
WHY would people spend so much time and talent creating these things to destroy the property of people they dont even know. Is there money in it? Whats the point of destroying the Internet THEY ARE USING by making it so dangerous? Can someone splain it to me?”
DEMOCRATS LOL
ping
Perhaps. Depends on the nature of what they hacked in the pirated version, and if they can find a way to apply their trojan in a way that does not involve a full download.
One thing this event helps to point out, is the potential dangers of open-source software. Yes, this trojan was placed into "pirated" software, but it could as easily have been placed in something open-source, and downloaded by its victims on that basis.
If the hackers are content to achieve a series of "occasional infections," similar to what happened here, then providing links to their own versions of open-source software can provide that access.
Does this only apply to downloaded executable programs, or does it also apply to picture downloads - like from YouTube & picture files?
“Being relatively computer literate, I understand how viruses work, but would someone please tell me WHY??”
After they get your account number and password, they can loot your bank and brokerage accounts via wire transfers. If you don’t look at your account regularly and don’t get paper statements, the money could be gone before you notice it. A pickpocket can steal your wallet - these people can steal every dime you own in an online-accessible account.
Other than the reasons already mentioned; some of these people (the really good ones) can actually make a legitimate living with their “Black Hat’ knowledge. Either by consulting with companies on security procedures, and/or writing things to test new detection algorithms, or reverse engineering and backtracing existing ones in the wild. That’s the “White Hat” side of the same coin.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.