[LINK] Apple Mac malware: caught on camera
Ivan Trundle
ivan at itrundle.com
Fri Mar 27 21:34:17 AEDT 2009
Lovely.
A variant of the exploit found back in October of last year, it seems
to have affected mostly people looking at dubious videos of Britney
Spears, porn hunters, and warez seekers, and who are happy to a)
download software from an untrusted/unknown source, then b) be asked
to use their admin password to install it.
Windows XP can install in the background without the user's knowledge,
so they're possibly worse off.
No OS can protect against social engineering hacks, and no trojan
horse protection will be able to stop it in time, either. What is
interesting here is that the video attempting to make out that the
website in question was 'genuine' in look and feel: I'd respond by
saying that any software which claims to offer 68 different features
(such as 'Advanced Power Saving Scheme for notebook PC') in only 10MB
is doing it all wrong. Either that, or they should be working for
Adobe or Microsoft.
What really annoys me, though, is companies like Sophos and Intego
don't suggest that the best protection is to be more cautious and less
stupid, but rather to rely entirely on paid software from these two
companies. The FUD factor is galling.
iT
On 27/03/2009, at 7:33 PM, Kim Holburn wrote:
> http://www.sophos.com/blogs/gc/g/2009/03/25/apple-mac-malware-caught-camera/
>> Pob in our analysis labs blogged earlier this week about a new
>> variant of the RSPlug Trojan horse for Mac OS X that he had written
>> protection against.
>>
>> One of the ways in which the OSX/RSPlug-F Mac Trojan horse is being
>> distributed by hackers is in the form of a poisoned HDTV/DTV program
>> called MacCinema.
>>
>> As you'll see in this video, visiting a website that gives many of
>> the signs of legitimacy, can lead to you downloading a Trojan horse.
>> Even for the Apple Mac.
>
>
> http://www.youtube.com/watch?v=RTeSYmQS820
>
>> The video is also available on YouTube.
>>
>> And don't try and tell me that this couldn't affect Mac OS X users
>> because they would have to enter their administrator username and
>> password to install the package. If they were prepared to download
>> this program from this website, I feel pretty confident that they
>> would enter their administrator details to allow installation too!
>>
>> Mac users are no different to Windows users in this regard - this is
>> social engineering, plain and simple.
>>
>> Oh, and Windows users shouldn't feel too smug about this either. If
>> you visit the site on a Windows computer, it will serve up a
>> malicious Windows executable from the Zlob family of malware rather
>> than a Mac OS X Trojan horse.
>
> --
> Kim Holburn
> IT Network & Security Consultant
> Ph: +39 06 855 4294 M: +39 3494957443
> mailto:kim at holburn.net aim://kimholburn
> skype://kholburn - PGP Public Key on request
>
>
--
Ivan Trundle
http://itrundle.com ivan at itrundle.com
ph: +61 (0)418 244 259 fx: +61 (0)2 6286 8742 skype: callto://ivanovitchk
More information about the Link
mailing list