Skip navigation

Version Comparison: Viruses, Trojans, Malware - and other aspects of Internet Security

Comparing: Revision 1 » Revision 2

The user tip body was too large to do a version comparison

Color Key: Addition Deletion Change
Revision 1   By Klaus1 at 2 years, 2 weeks ago Revision 2   By Klaus1 at 2 years, 6 days ago

DON’T PANIC! Bear in mind that from April to December 2011 there were only 58 attempted security threats to the Mac - a mere fraction compared to Windows malware:


But be aware that the Internet is riddled with potential threats to the security and well-being of your Mac or iOS device. The following (which you are welcome to print out and retain for future reference) seeks to offer some guidance on the main security threats and how to avoid them. If you have further questions please post in the forum appropriate to your particular hardware or operating system.



No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.


It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download from:


For Tiger:


and for Leopard, Snow Leopard and Lion from here:


(I have ClamXav set to scan incoming emails, but nothing else.)

Note: the uninstaller is included with the application. To uninstall, quit ClamXav Sentry (if you use it) and make sure it's not set to launch at log in. The uninstaller will remove the engine and any schedules you've got set up, then just drag to the trash.


If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.


Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.




Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.

Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software. Examples include MacKeeper, MacDefender and iAntivirus, but there are others.


Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.

Once installed, the software may steal data or force people to make a payment to register the fake product.

Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.: which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher




The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.


If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.


You can check here if you have been infected with DNS Changer malware:


SecureMac provides a Trojan Detection Tool for Mac OS X.  It's available here:


The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.


First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support -


(Note that a 30 day trial version of MacScan can be downloaded free of charge from:


and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)


Re-direction can be avoided by using the Open DNS settings


A white paper was published on the subject of Trojans by SubRosaSoft, available here: general_info&cPath=11&products_id=174


Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :


These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.


Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.


You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:




Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:


Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:


(You can also enter them if you click on Advanced and then DNS)


Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:


There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!




If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal: the-problem/


Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.


1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.


2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites, i.e. the developers’ own web sites or the Apple App Store.  If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.


Adobe is aware of malware posing as its Flash Player and warns users to ignore any updates that didn't originate on its own servers. "Do not download Flash Player from a site other than," said David Lenoe, Adobe's product security program manager, in an entry on Adobe Product Security Incident Response Team's PSIRT blog. "This goes for any piece of software (Reader, Windows Media Player, QuickTime, etc.). If you get a notice to update, it's not a bad idea to go directly to the site of the software vendor and download the update directly from the source. If the download is from an unfamiliar URL or an IP address, you should be suspicious."


The ‘Flashback Trojan’:


A version of an existing Trojan Horse posing as a legitimate Flash Player installer (named “Flashback.A” by a security firm) is designed to disable updates to the default Mac OS X anti-malware protection system, potentially leaving the system open to the manual installation of other malware without any system warnings. The latest Macs do not have Plash Player included. In order to prevent a potential infection with “Flashback” Trojans, Mac users should always obtain their copy of Adobe Flash Player directly from Adobe’s official website and to disable the "Open 'safe' files after downloading" option in Apple's Safari browser to avoid automatically running files downloaded from the Internet. Also, do not turn on Java in Safari Preferences.

/Security. Few websites use Java. Javascript is something entirely different and should be left active. disable_mac_os_x_anti_malware_protection.html


You should be able to prevent infection by disabling Java (not Javascript) and also turning off 'Open safe files after downloading' in Safari Preferences/General.


Flashback Trojan - Detection, and how to remove (with caution):



3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.


4. Use Mac OS X's built-in Firewalls and other security features.


5.  Avoid Peer-to-peer sharing applications. Download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:

It has been estimated that one in six links posted on Facebook pages are connected to malicious software.

to which Facebook responded:

"Facebook and Internet security company Web of Trust (WOT) will provide Facebook users with a feature that protects them against dubious Web links, the companies said this week.

When a Facebook user clicks on a link that leads to a page with a poor reputation rating given by the WOT community, the user will receive a warning message. Typically, the sites with a poor reputation are known for phishing, untrustworthy content, fraudulent services or other scams."


6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:

YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:


There is the potential for having your entire email contact list stolen for use for spamming:


And if you are using iPhone Apps you are also at risk of losing all privacy: nsmit-udid-pose-se/


The advent of HTML5  may also be a future threat to internet privacy:


Security of OS X generally:


Security Configuration for Version 10.5 Leopard:


This Blog entry is also worth a read:

NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.

Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.

However, if you are running Lion Server:


Apple's new server operating system -- OS X Lion -- is said by Stamos to be inherently insecure , and they recommend keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.

The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.


If you discover that emails are being received by your entire address list which you didn’t send, it is possible that you have been infected by a Botnet. To check whether this is the case, go here  (do not enter any information) and it will tell you.

Malware distributors have recently launched a new wave of attacks aimed at taking over unpatched PCs and Macs. They look like routine messages from a bank or a social network, but instead of phishing for passwords, they’re serving up malware: s-and-macs/4648


Another source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace:

More than 50 applications available via the official Android Marketplace were initially found to contain a virus.

Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.

Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.

Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.

The data being leaked is typically used to get at web-based services such as Google Calendar.

The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.

Smartphones and social networking sites are becoming the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.

In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area, and Android is still in the firing line:

Juniper found a 400% increase in Android malware from 2009 to the summer of 2010. The number of malware samples identified in September increased by 28% over the number of the known Android malware samples. October showed a 110% increase in malware sample collection over the previous month and a striking 171% increase from what had been collected up to July 2011.


Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

This site contains user submitted content, comments and opinions and is for informational purposes only. Apple disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the Apple Support Communities Terms of Use.