Malware Removal Instructions

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 17 July 2012

Apple Computers ARE Susceptible After All

Posted on 10:21 by Unknown
Some PC users might feel that Apple customers have been a bit "uppity" in regards to their OS, regarding security in particular. Much of this comes from Apple itself, which has openly bragged about how the Mac OS is immune to viruses. Recent developments have served to tarnish this reputation, and it seems Mac users would be wise to sit up and pay attention to a world they might have blissfully ignored before: cybercrime.

While Macs have admittedly seen far fewer widespread cases of malware infection compared with Microsoft boxes, this is probably a result of the fact that there has been a wide discrepancy in ownership percentages between the two platforms and, therefore, less incentive to devote the time and resources necessary to fully exploit the lesser-used Macs. As the ownership gap closes, however, and Macs comprise a larger percentage of the computer marketplace, they are naturally becoming more appealing to cybercriminal exploiters.

Here are some of the attacks that have been successfully launched against Macs.


Flashback

Flashback made the headlines recently as it has reportedly infected upwards of 600,000 computers, most of which were located the United States and Canada. The malware originally hit the wild as a fake update to the Adobe Flash plug-in (ironically, Apple founder Steve Jobs hated Flash). When users installed it, thinking they were simply upgrading their existing Adobe software, they were actually installing a Trojan with the potential to steal sensitive data off of the victim's Mac, such as passwords, bank account logins and more. Furthermore, the Trojan allowed hackers to take over their victims' computers for use in denial-of-service attacks and other schemes.

Flashback has since permutated into a Java-based exploit, which can be installed without the user's knowledge simply by visiting an infected webpage which will invoke the Java exploit.


SabPub

This recent malware works as a downloader, a software that connects to a "command and control" network from which it takes orders and initiates downloads from servers controlled by criminals. The effects are similar to Flashback, with data theft or control of the machine being the main goals.

As of this writing, the software appears to be in a beta or experimental phase, but as infections have been noted in China, which is notorious for having infected computers, expect it to spread and mutate into more damaging forms as time goes on.


Password changes

With the OS X Lion release, Apple left a password vulnerability wide open (since patched). Anyone with access to a machine was able to change the default password with a simple procedure using the Directory Services.

If a downloader exploit, as previously described, were to be installed, and one of the programs downloaded to the victim's Mac were a remote desktop interface, then a hacker could not only take control of the machine and steal everything on it, but could also lock the owner completely out of his or her own computer.


Scareware

Scareware, or programs which attempt to frighten users into downloading and installing software to protect against non-existent threats, have successfully infected Macs since at least 2008, with the release of MacSweeper. This rogue piece of scareware looked somewhat like the legitimate Mac Sweeper, but instead would "find" numerous problems which did not exist. It would then ask the mark to pay for the software in order to clean the "infection," which of course resulted in nothing but an emptier wallet for the victim.

Another, similar software was MacDefender, which was particularly troublesome as the developers would release new permutations as fast as soon as Apple could defend against previous versions through patches. It was also extremely difficult to remove, as it hid itself by working without a dock icon.


The future

The Mac platform has an ironic problem in that one of the reasons it has resisted viruses is the fact that most software is installed via its official App Store. That is also the reason why antivirus programs have made little inroads into the Mac user base. The Apple App Store forbids automatic, continuous updates by a software program, which is something that just about every antivirus program depends upon to keep its signature file updated.

To Apple's credit, they are addressing the vulnerabilities by releasing a program called Gatekeeper this summer which will allow users to better regulate where their software is installed from, making "drive-by" websites, which infect visitors with hidden scripts, less dangerous, and strengthening the OS's security profile overall. Regardless of the actions taken by Apple, Mac users should note that the climate has changed for them, and that they are now, more than ever, directly in the crosshairs of hackers. For them, it pays to follow the developments of this disturbing, evolving trend and do what is recommended by security experts to keep their systems protected.

About the author: When John Dayton isn’t buys covering LWG Expert Directory, he commits himself to the tech industry. Having written about tech for many years, John has developed a wealth of knowledge.

Tell your friends:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security Advisories | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Remove ShopperReports (Uninstall Guide)
    ShopperReports is defined as adware or a potentially unwanted program that displays marketing related results in a side pane of the browser...
  • Trojan.MBRlock, Внимание! Ваш компьютер заблокирован
    Trojan.MBRlock is a very disturbing piece of malicious code which infects the master boot record (MBR) and prevents Windows from starting. ...
  • Remove RiskTool.Win32.BitCoinMiner (Uninstall Guide)
    RiskTool.Win32.BitCoinMiner is a risk tool or potentially unwanted application that may use your computer's resources to generate bitco...
  • What is wrtc.exe and how to remove it?
    wrtc.exe - by Perion Network Ltd. What is wrtc.exe? wrtc.exe is a part of IncrediMail software, digitally signed by Perion Network Ltd. This...
  • Remove Rattlingsearchsystem.com (Uninstall Guide)
    Rattlingsearchsystem.com is a ZeroAccess/Sirefef rootkit-related browser hijacker that redirects users to shady websites while searching on...
  • False Positive: Ikarus and Comodo detecting TDSSKiller as a Trojan horse
    This awkward moment when you realize that your favorite rootkit removal utility is detected as malware. I probably wouldn't even have no...
  • Remove TR/ATRAPS.Gen2, removal instructions
    Cyber crooks and third parties that buy stolen data are increasingly using more and more sophisticated techniques, in a variety of different...
  • Remove Ask Search and Ask Toolbar (Uninstall Guide)
    Ask Search and Ask Toolbar are very often incorrectly classified as virus/spyware that may cause search redirects. The majority of us pref...
  • Remove Windows Attention Utility (Uninstall Guide)
    Windows Attention Utility is a rogue security application that generates misleading warnings about nonexistent viruses and attempts to lure...
  • Remove "System Check" (Uninstall Guide)
    System Check is malicious software posing as Windows system utility. Although, it may look like a real thing, it isn't! You are actuall...

Categories

  • Adware
  • Answers
  • Antivirus software
  • Browser Hijackers
  • Cloud Computing
  • Fake Alerts
  • Giveaways
  • Hoax
  • How-To
  • IaaS
  • Internet
  • Malicious websites
  • Malware
  • PaaS
  • Parental Controls
  • Passwords
  • Phishing
  • Process Information
  • Ransomware
  • Rogue programs
  • Rootkits
  • SaaS
  • Security Advisories
  • Spam
  • Spyware
  • Trojans
  • Viruses
  • Web Browsers
  • Worms

Blog Archive

  • ►  2013 (173)
    • ►  December (6)
    • ►  November (13)
    • ►  October (11)
    • ►  September (20)
    • ►  August (4)
    • ►  July (17)
    • ►  June (31)
    • ►  May (25)
    • ►  April (15)
    • ►  March (17)
    • ►  February (7)
    • ►  January (7)
  • ▼  2012 (86)
    • ►  November (2)
    • ►  October (4)
    • ►  September (6)
    • ►  August (6)
    • ▼  July (11)
      • Remove Windows Ultra Antivirus (Uninstall Guide)
      • SearchYa! Toolbar and Searchya.com (Uninstall Guide)
      • Boxore Adware (Uninstall Guide)
      • Remove Welcome to Nginx! (Uninstall Guide)
      • Remove Police Central e-crime Unit Virus (Uninstal...
      • Remove International Police Association (I.P.A.) V...
      • Remove MyStart by IncrediBar Search and Toolbar (U...
      • Apple Computers ARE Susceptible After All
      • Remove "File Recovery" Malware (Uninstall Guide)
      • Effective Network Internet Control for Effective S...
      • Remove FBI MoneyPak Ransomware (Uninstall Guide)
    • ►  June (1)
    • ►  May (5)
    • ►  April (7)
    • ►  March (7)
    • ►  February (17)
    • ►  January (20)
  • ►  2011 (239)
    • ►  December (8)
    • ►  November (18)
    • ►  October (21)
    • ►  September (24)
    • ►  August (28)
    • ►  July (32)
    • ►  June (16)
    • ►  May (23)
    • ►  April (15)
    • ►  March (16)
    • ►  February (9)
    • ►  January (29)
  • ►  2010 (2)
    • ►  December (2)
Powered by Blogger.

About Me

Unknown
View my complete profile