backtop


Print 88 comment(s) - last by overzealot.. on Mar 6 at 1:06 AM


The new Apple Trojan "BlackHoleRat" sneaks itself in through OS X users' open back doors. It is currently in "beta" and its capabilities are being expanded.  (Source: Sophos Labs)

One of its capabilities is to pop up fake administrator password request windows as a phishing attempt  (Source: Sophos Labs)

The trojan even delivers humorous messages to users in current form.  (Source: Sophos Labs)

  (Source: Chris Moncus)
Malicious program still appears to be in "beta" form, unlike its Windows counterpart

Security researchers at Sophos Labs have discovered a naughty new trojan that's in the process of beta testing attack capabilities against the growing population of Mac users.

The trojan exploits open back doors in OS X to gain a good deal of access to the system.  It can be transmitted through a variety of vectors, including torrent files or seemingly legitimate download programs.  It could also be, in the future, delivered via the exploitation of browser flaws to perform "drive by downloads".

Once inside, the Trojan gets down to business, allowing the attacker to have their way with their Apple victim.  The attacker can plant text files on the desktop, force URLs to open, run shell commands, and pop up fake password windows in a phishing attempt.

They can also force the users machine shutdown or reboot. When a reboot is forced an amusing message pops up, informing:

I am a Trojan Horse, so i have infected your Mac Computer. I know, most people think Macs can't be infected, but look, you ARE Infected! I have full controll over your Computer and i can do everything I want, and you can do nothing to prevent it.

So, Im a very new Virus, under Development, so there will be much more functions when im finished.

The virus is a port of darkComent, a remote access trojan for Windows.  The new OS X versions has been dubbed "OSX/MusMinim-A", or "MusMinim" for short, by Sophos.  Its creators, however, call it BlackHoleRat.

Sophos believes its creators will likely expand its functionality now that the concept has been proven.  It will likely be loaded with far nastier tricks in the future.

Despite its obscurity, Apple's poor security track record virtually ensures that Apple OS X users back doors will be open in years to come.  And increasingly they may find malicious individuals looking to poke and prod their way inside.

Still Apple has been quite quiet in its direction to users to get an anti-virus program.  To this day it still tries to portray Windows as "virus-laden" and OS X as virus-free.  As a result of this ostrich-in-the-sand attitude, some users may fall victim of unwanted backdoor intrusion.

Apple has yet to comment on its users' latest infection or hint at how widespread it might be.


Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Wut?
By Iaiken on 2/28/2011 5:02:51 PM , Rating: 5
We were playing with this on a mac at work today and you seem to not understand it's capabilities.

It can do all of the following WITHOUT need of the administrative password:

- Remote execution of shell commands
- Create text or other script files remotely
- Send data to a remote server

- Open up a web page from safari
- Send a message to the victims screen
- Perform shutdown, restart and sleep operations

The bold items above are cause for concern since I could essentially send script files to your PC that create opportunities for any manner of exploit. The 'Finder' dialog example is one such example of just what you can do.

Once this is better fleshed out it will become more sophisticated as the payloads increase in size and complexity. The best attacks will be ones that mimic authentic dialog boxes at appropriate times. This is not hard to do since you can see which programs are running even without administrative rights.

All you need to do is something like this:

quote:
#!/bin/sh
PIDS=`ps ax | grep 'updatedb\|find' | grep -v grep | sort | awk
'{print $1}' | perl -ne 'chomp;print "$_ "'`
if [ "$PIDS" ]
then kill $PIDS
fi


This will try to kill the updatedb script which will prompt for an administrative password. You then immediately follow it up with a prompt saying "oopsie, the service has failed" and that you need to type in your administrative password to restart it.

And this is just the first one I could think up off the top of my head.


RE: Wut?
By testerguy on 3/3/2011 4:39:50 AM , Rating: 2
Are you saying you were able to install this an run dangerous shell commands remotely on the machine without ever entering your Administrator password?


"You can bet that Sony built a long-term business plan about being successful in Japan and that business plan is crumbling." -- Peter Moore, 24 hours before his Microsoft resignation














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki