backtop


Print 117 comment(s) - last by JKflipflop98.. on Nov 6 at 8:52 PM


Mac users are now at risky of getting a nasty virus.  (Source: Listmania)

If it you approve, you are a sad noob, and your Mac is infected.  (Source: Intego)
Mac: Hi PC, I'm not feeling so hot today... PC: Oh, I know ALL about that. I think you have a virus!

Security experts by and large agree that security via obscurity is not a wise model for protecting customers over the long term.  That's exactly the model Apple has employed successfully for some time now.  However, its luck finally appears to be running short.

Hot on the heels of a newly discovered iOS exploit that allows access to locked iPhones, new reports [1] [2] from security research firms 
SecureFirm and Intego reveals that a new trojan is targeting Mac users using a vulnerability in OS X's Java player.

According to the 
Intego report the new malware, trojan.osx.boonana.a, is really a reworked version of the Koobface malware, which has attacked Windows in the past.  The malware acts as a worm when it spreads and as a trojan when it is infecting your computer.

Users may encounter the worm via links posted on Facebook, MySpace, Twitter, and other websites.  When clicking the link, the applet attempts to run.  Users can stop the infection before it starts by denying the applet permission to run when OS X's Java player pops up a dialogue.

If they allow the applet to run, they may get another warning if they have a Mac antispyware program like VirusBarrier X6’s Anti-Spyware installed.  If they don't get the warning, or choose to disregard it, the applet will attempt to make a connection with a remote server and installs a rootkit, backdoor, command and control, and other elements.  These files are copied to an invisible folder -- .jnana -- in the user's home directory.

If the virus is allowed to carry out its infection process, the unsuspecting Mac user may find themselves part of a botnet.  When they log on social networks, the virus will post links to spread the infection.  It may also send spam e-mail via their logged-in accounts

Other variants of this virus target Windows and Linux, making it a rare true cross-platform virus.  All these viruses share the fact that they use the Java player as a route of attack.  According to 
Intego, other OS X-specific versions of the virus have shown up, but most are broken or try to connect to offline servers.

The malware could become potentially more dangerous in the future if it is able to eliminate the warnings from the Java player and/or change the name/location of the infection directory, making it hard for virus removal software to find it.

While it does not appear that this virus takes advantage of any unique flaws in Apple's version of Java, some security experts say that Apple's Java player may have more vulnerabilities than Window's.  That's because Apple makes its own Java player, which according to an e-mailreportedly attributed to Apple Chief Executive Steve Jobs, is always a version behind the official Linux/Windows builds from Sun and Oracle.

Apple is reportedly considering ditching its Java player in future versions of OS X, such as OS X 10.7 "Lion".  Similarly it's considering rejecting Flash, another multimedia web technology.  Ultimately these efforts may eliminate some routes of attack, but now that Apple is being targeted it must realize -- there is 
always a back door.

 



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Hold on....
By bitterman0 on 10/28/2010 1:07:58 PM , Rating: 3
quote:
I think it occurred without the users knowledge before apple released a security patch, now it will pop up a warning showing you there is an unauthorized applet trying to run

In my experience, the JVM running in a browser would always pop up a warning if a Java Applet requests permissions to access local resources (such as the filesystem). This happens regardless of the Applet being signed with a valid security certificate. It was like that since the inception of Applet business, actually. Unless Apple made a mistake in their version of JVM, I would assume the warning was there, users simply clicked through it without reading or taking a moment to contemplate the reason why a Java Applet wants to access local resources (which may present itself as legitimate, by the way, since the application is called "Photo Album").

quote:
With OSX you are almost always running as root, but just like nix, you have to enter your password for most things that alter anything at the system level.

Can't vouch for OS X, really, but I believe what you are thinking about is a mechanism called sudo. A really neat utility, if you ask me, and while it behaves somewhat similar to UAC from the end-user viewpoint, it is fundamentally different because unlike UAC the user is not really root. Furthermore, sudo can grant very specific permissions to very specific users, so the privilege elevation process does not have to end up at the root level every time.

Personally, from the systems administrator standpoint, I prefer su to sudo. Although, while having some overlap in their functionality, those are two very different privilege elevation mechanisms.


"Well, we didn't have anyone in line that got shot waiting for our system." -- Nintendo of America Vice President Perrin Kaplan














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki