Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Defense: Malware targeting Mac's

Mac's users running any browser with JavaScript turned on by default are vulnerable to being tricked into clicking on a trick image and/or link.


That image may appear to be a standard OS X window with a close box or the typical OS X looking window asking a question with OK or Cancel. It can look like anything really, it's purpose is designed to get you to click anywhere on it and initiate a download to your computer.


Safari tries to be helpful and "Open Safe Files" by default, which is being used with numerous success to run code on one's machine, by bypassing the normal user action of 'open the downloads folder and then clicks on the download to run' process in exchange for convenience.


Most Mac's are used with one person, and the initial setup of a new Mac (or a new OS X install) is the first user is automatically a Administrator User. Running one's typical day to day use while in Admin User mode gives any code running on one's machine more privileges and access than it would receive if the user of the computer created another OS X account and ran most of their computer use as a General User.


The ultimate access for rogue code would be Root User, which on Mac's is turned off by default, however a temporary access window to Root User is allowed when a Admin User provides his or her Admin Password. Once rogue code gets Root user access, it's all over, OS X is completely compromised.



The key to security on a Mac, or any computer system actually, is a process called "Compartmentalized Security" where the more privileges code receives, the more it's subjected to time and scrutiny to determine it's legitimacy.


Web browsers are the forward troops facing a overwhelming enemy, the World Wide Web. Not one modern web browser is 100% safe, not Safari, not Firefox, not IE, not Chrome, not Opera. Neither are plug-ins or scripts that run within these browsers 100% safe.


So the key to maintaining security is to provide a high level of "Compartmentalized Security" steps which shifts the exploit potential further down the privilege level so it can't do much of anything or gain further access.


People can get carried away with downloading and installing software in a rapid fire manner, this provides a ripe opportunity for malware to get onto one's computer, even gaining root access right away.



So in order to provide better compartmentalized security, provide more time and steps before potentially installing rouge code. I suggest the following actions:


1: Run most of your day to day computer use as a General User with less privileges. This can be done by creating a new Admin User, logging out of the present user and into the new Admin User, then turning the first user into a General User.


Whenever certain actions are needed, like accessing the Application's folder (where programs can be changed by malware) a Admin Name and Password will be required. A small hassle, but it provides another step for it to get past.



2: Use Firefox web browser and the following Add-ons: NoScript, Ad Block Plus and Public Fox.


Under the Toolbar customization, drag the NoScript button to the toolbar. NoScript turns off all scripts and plug-ins by default, which if you trust the site your on, you click the button for turning them on and the page automatically reloads.


In Public Fox preferences, set a password on downloads, this way a popup window appears before any download occurs, keeping malware from sneaking into your downloads folder and potentially being clicked on.


With Ad Block Plus, subscribe to the Easy List which automatically appears in the browser window. This will auto-update to keep advertising, which has been used numerous times as a attack venue, from appearing.


Click&Clean, Ghostery, BetterPrivacy, FlagFox, WOT, HTTPS-Everywhere (from the Electronic Frontier Foundation) are also highly recommended add-ons.



3: In Safari preferences, turn off "Open Safe Files" install the Ad Block Plus add-on and the Click2Flash add-on. If any add-on appears in the future to simulate what NoScript and Public Fox does on Firefox, then enable those add-ons.



4: Check the staus of your browser plug-ins. These websites makes it easy, bookmark them in a obvious place so you remember to visit them routinely. As soon as a vulnerability appears, either update or turn off the affected plug-in in your browser until a patch is issued.


https://www.mozilla.com/en-US/plugincheck/


https://browsercheck.qualys.com/



5: If you enjoy surfing the backalleys of the Internet and you have at least a decent dual core Intel based Mac, I'd highly advise installing the free VirtualBox and loading a free ISO of Linux Mint DVD 32 bit 10.10 (most consistent and easy to use, everything included, Linux distro)


http://www.virtualbox.org/


http://www.linuxmint.com/download.php


The object is to load and install Linux Mint into the virtual machine like installing a operating system onto a regular computer. Once completed, then save a snapshot to revert to after your Firefox browsing session (in Linux) is completed. All and any potential malware, caches etc is flushed when you revert the entire guest OS back to the earlier state. Keep the Guest OS updated via the Software Update option and save a new snapshot.



6: Use common sense, if it don't look right, then stop and flush the OS X based browser from memory via the Apple > Force Quit menu.


7: Install the free ClamXav, it will remove the OS X malware it knows about, offering some after the fact defense and Windows malware from their files.


http://www.clamxav.com/


I don't advise a full time, always on and running anti-virus solution for Mac's due to Apple's tendancy to change the underlining OS themselves to thwart potential malware. So something like Norton which maintains tight control over OS X should be avoided.


Malware on Mac's are a scarce thing because of Apple's top down approach, but trojans are a potential attack venue and people need to insure more steps to avoid being tricked.

MacBook Pro, Mac OS X (10.6.7), XP, Vista, 7 many Linux distros

Posted on May 8, 2011 4:40 AM

Reply
Question marked as Best reply

Posted on May 8, 2011 5:11 AM

Run most of your day to day computer use as a General User with less privileges.


That causes problems for some apps, which won't run on anything but an admin account or on the account they were installed on. And it's not a guarantee of security - a user who gets in the habit of authenticating to admin to install stuff from their Standard account is no safer than the user who gets in the habit of authenticating to install from their Admin account. This is a good general suggestion, but may not work for everyone and provides practically no real security against "social engineering" by itself.


2: Use Firefox web browser and the following Add-ons: NoScript, Ad Block Plus and Public Fox.


Again, using things like these won't protect you by themselves. How do you know if a site is trusted and should have JavaScript turned on? And most folks are finding this malware via trusted sites that have had malicious JavaScripts "sneaked" into their code, through malicious ads or search engine optimization poisoning. How can you know if your trusted site is affected? And, given how much this malware has been jumping around over the last week, I seriously doubt Ad Block Plus can keep up.


3: In Safari preferences, turn off "Open Safe Files" install the Ad Block Plus add-on and the Click2Flash add-on.


Note that even folks with Safari's Open "safe" files after downloading option turned off have been affected by opening the installer manually. And some have been alerted to the presence of malware by the automatic appearance of the installer. I'd still agree, though, but would add that you should keep your Downloads folder cleaned out, so that any suspicious items that turn up will be easily recognized, and not mistaken for something you downloaded earlier.


As to Click2Flash, I think nobody should be on the web without it! I don't trust Flash as far as I could throw Adobe.


I'd highly advise installing the free VirtualBox and loading a free ISO of Linux Mint DVD 32 bit 10.10


That is not a realistic suggestion for the average person, who will have neither the desire nor the knowledge to run Linux.


6: Use common sense, if it don't look right, then stop and flush the browser from the Apple > Force Quit menu.


This should have been #1! AV software has struggled to keep up with all the variants of MacDefender, malware sites move on sometimes an hour-by-hour basis and malicious code sneaks into trusted sites. In all, no automated defense tool will protect you from a new threat... only your "wetware" can do that!

86 replies

May 16, 2011 3:54 AM in response to Rayced

In fact (even if this could be the case for this particular malware) if a malware would modify a previously allowed process than it will not get caught.


I guess it doesn't matter that I already proved it does not modify any other processes (you seem to have conveniently forgotten that I showed what files got modified), but whatever.


If you think you know better, say so. I don't think you can, because your knowledge seems restricted to knowing who some security experts are and the names of some good terms and books. If you are a security expert, give us your own analysis. If you know of a security expert who has done an analysis of this trojan and posted anything other than "here's what it looks like, now use my AV software," please let us know. Otherwise, be quiet and let those with information share it.

May 16, 2011 4:37 AM in response to thomas_r.

I think I've stressed enough the weakness of both your analysis and solution. Users that will get this kind of malware will choose either to just delete the files you're pointing at or both follow also my advice to also re-install latest Mac Os X ComboUpdate at this particular stage of the incident whereat there isn't yet an Apple official document.


That said I really hoped this community was a little more of a team trying to improve any solution found to flaws. I was wrong. Bye.


PS I've added some comments to your site addressing the same topic (but with a different attitude cause of course that's your blog and I respect your "house"), we shall see how open you are to suggestions and improvements or to critics. Here is different cause it's not your "house", even though you seem to be in the "elite" of the users of the board.


PPS Another good simple thing to do is also to change the administrator pwd, just in case.

May 16, 2011 5:02 AM in response to Rayced

Rayced wrote:


Why do..


Rayced,


When this thing first appeared several days ago, nobody knew anything. Since it rapidly changed it's spots, I recommended that people don't take any chances and backup/wipe/install or take it to someone who can do it for them.


Security folks have gotten a hold of this malware and taken a look at it and determined it's a LOW THREAT, meaning rather simple removal techniques are sufficient for most people.


It's looking like the original writers of this malware are not all that talented, as they had the opportunity to really sock it to us. There is the possibility that third parties or even the original writers may make a more potent version.


It is possible the original writers are playing stupid in order to slip a rootkit in, send out vital information, open ports, change a router DNS settings, alter a program or do some other covert action. So far the experts have determined it's not doing anything like this.


Therefore I've amended my position that the backup/wipe/reinstall is a OPTIONAL STEP for regular users to the steps mentioned by security researchers in removing this LOW LEVEL threat.


For those who systems are of critical importance shouldn't take any chances, anyone worth their salt in charge of these systems would know to boot off write protected medium and Zero Erase and restore from a hold option bootable clone anyway. (well I hope they do)


If people feel more comfortable with a backup/Zero wipe/install or reverse clone, then by all means they should do so, it's up to the user to determine for themselves the best course of action in their case.


I always maintain a few timed clones on external drives, because a mere $100 per TB drive and a few minutes a month to update a clone with Carbon Copy Cloner is a rather small price to pay than a lengthily rebuild.


Anyone who has personal data they don't want a browser exploit reading or uploading on line should have it encrypted.


Just like Thomas, we both haven't got malware on our Mac systems for over 20 years. Apple has been very good about their security, there are a few cracks showing, some low level Trojans, but nothing crazy.


On the Windows side it's a whole different matter, lately I've been getting calls that people say their ISP cut them off for some reason and won't let them back on. Turns out their entire setup from the router out is compromised.


Mac users in general don't want that sort of pain, and the costs involved. So Mac users should take care in doing two simple things.


1: Backup their personal data, which can't be recovered if the hard drive dies. Use TimeMachine, a clone, a external drive, cd/dvd's, something, anything. Get their personal data off their machine and someplace safe from fire/flood/electrical/theft etc.


2: Avoid giving anything they can't verify the source their Administratvie password.



So relax, discusss and even agree to disagree, but don't personalize and attack. Thanks 🙂

May 16, 2011 5:48 AM in response to R C-R

R C-R wrote:


Please study the Terms of Use for this site. Note that when possible you should test your submissions on your own computer before you post it. Thomas has done that & has published links to detailed info about how he did that.


R C -R,


Your suggesting people who have no computer security experience download malware, try it on their systems and then report what happens just to please the Terms of Use?


Clearly, common sense and the "when possible" applies in this case.


Thomas is brave for what he did, if that malware was a real nasty one, he likely would be dragging all his Apple gear to the Genius bar for a firmware flash and we wouldn't be hearing anything from him for several days. His web site could have been comprimised as well.


So quit using the "Terms of Use" out of it's intended purpose. 😉

May 16, 2011 6:35 AM in response to Rayced

PS I've added some comments to your site addressing the same topic (but with a different attitude cause of course that's your blog and I respect your "house"), we shall see how open you are to suggestions and improvements or to critics.


I did not approve those comments on my blog, as I don't need you confusing the folks reading there, and at least I have control there. In the interest of full disclosure, however, one comment read:


I would at least re-install the latest Mac Os X Combo update after having removed those files. There is no guarantee on your tests that the malware hasn’t also installed a rootkit or a rootkit was installed meantime the infected machine of a user was opened with the trojan horse.


There's so much wrong there I scarcely know where to begin. First, you clearly don't understand what a combo updater does. Installing a combo updater replaces only some of the system files. Yes, if one of those files got modified by malware, that would fix it, but that's a shotgun approach that might hit what you want and might not.


Second, in order for a rootkit to be installed, some files would have to be added to the system that were not added to the system. I have verified this by comparison to a reference system, while booted from a third system. I did not use the tools that you have read about other people using, but that does not make the comparison any less valid.


Your second comment was:


I don’t see why bothering installing a trojan if the only purpose of this malware was to con people and letting them pay for an application that claims something that it doesn’t. That said I personally don’t think your tests are complete and solutions you gave are at least missing a re-install of latest Mac Os X ComboUpdate, in case some system file was changed either during the install or while the system was exposed by the trojan horse. I would recommend you to do a test using also a different tool for Computer Forensic, which is a Integrity Host Monitor such as Osiris or Shamian.

I don’t think this is too paranoid, but instead a good approach to this kind of incidents suggested by people like the shamoo group founders whom cope with this matter every day since a long time.

Moreover I’d rather config ipfw to close any ingoing and outgoing connection and log the result instead of using an application level firewall as Little Snitch to analyze the network behavior of the malware.

Please take this as my two cents to improve your work.


Again, there is a lot wrong with that (some for the same reasons as outlined above), and much of it is irrelevant and confusing to most of the people I'm trying to help.


The one thing I learned from your comments was that you are, apparently (if the address you provided is to be believed), from Italy, so some of your apparent rudeness may in fact simply be language-based. If that is the case, some of my responses to you were probably too harsh, though I still stand by everything I have said.

May 16, 2011 8:38 AM in response to thomas_r.

I do understand what a combo update does.

Indeed originally I said at least re-install lates Mac OS X Combo update, but a better thing would be to re-install the whole system. You can check by yourself.


I have question for you about this part of your document: "Empty the trash. (No need to securely empty.)"

Can you please explain how come you don't want to securely erase those files part of malware?


Another thing: you are sharing personal information of myself on this board that you collected via your personal website. I don't think that is so polite without asking me first if you could enter this infos. By the way, no problem: yes I'm from Italy, and you're right it's a different culture (I've been in US plenty). As I already said I apologize if it might seems I'm rude, that could be just a language difference.


Yet another thing that is actually not so in line with the policy of this board is suggest people to install a malware on their systems.


By the way after all you're showing that you're not democratic as the web requires to be when opening a discussion. You accept comments even if you disagree and then you explain your point. Unless who's commenting is putting spam or doing something else illegal or offending people using your blog.

May 16, 2011 8:55 AM in response to Rayced

Can you please explain how come you don't want to securely erase those files part of malware?


Because it serves no purpose. Deleted is deleted. Secure erase only ensures that you can't recover the malware using file recovery software, which is not something anyone is likely to be doing.


you are sharing personal information of myself on this board


What, that you're from Italy? Seriously? I apologize if my attempt to explain your apparent rudeness revealed that you are living somewhere within a 300,000 square kilometer area on the Earth's surface. I'm starting to think, though, that the rudeness is not just a language issue.


Yet another thing that is actually not so in line with the policy of this board is suggest people to install a malware on their systems.


Nowhere have I ever suggested that anyone install malware on their systems.


you're showing that you're not democratic as the web requires to be when opening a discussion.


I didn't open a discussion on my blog. I provided information. I do not welcome comments with inaccurate advice and ridiculous criticism, and I don't need pointless discussions of such things confusing my readers. Note that these forums aren't democratic either... Apple reserves the right to remove anything that violates the terms of use, and the moderators do so all the time.

May 16, 2011 8:59 AM in response to ds store

I was aware of that cause I've been reading a security blog from an AV software house. But when I red replies to your posts that were really cliché style I wanted to support someone making a good point about security without being too paranoid as someone also tried to make you appear.

Moreover I think that I've ran into something similar last year or a couple of years ago but didn't installed the crap, or probably I've installed it without paying and then flushed my system as I usually do quite sometimes for both security and performance reasons.

The thing you're saying about routers being infected too it's something people should start think of too. That is why Osiris has also a module for Linksys routers in order to monitor the integrity of those systems too.

I don't think that including a tool like this (an Host Integrity System) would hurt anybody in next Operating System release. Moreover in one of the book by shmoo group is also described a procedure to deal with this security incidents for later use in court in case the offended person wants to get on the legal part against the intruder.

By the way it was never my intention to personalize anything. The matter is that people here are not techically explaining their choices with their recipes to respond to this kind of incident. I bet you've red some of the stuff I linked, and probably you got what I meant.

Have a good day.

May 16, 2011 11:17 AM in response to Rayced

Rayced wrote:

Ok, you were just trolling in a different thread as you admitted about this matter.

I was not trolling. I was responding to wildly speculative comments made with no basis in fact or evidence by people that seem to be touting their lack of knowledge about this specific malware as a good reason to follow their advice about how to deal with it.


These comments are not helpful. Some are misleading, ignore the security features built into OS X, claim without any concrete evidence whatsoever that this trojan is or could be made into something capable of infecting firmware or installing a rootkit, or otherwise fail to offer any justification for the extreme measures they suggest are necessary to remove it. Some of it is self-contradictory, suggesting a removal measure in one comment that in others they claim is inadequate. Much of it is so vague that it isn't clear what it is supposed to mean. Some of it betrays little or no knowledge of basic security concepts or familiarity with the terminology beyond the buzzword level.


The purpose of ASC is for users to share useful, relevant information derived from their own experience & expertise. It is not to indulge in dubious, over-the-top speculation, or to obfuscate or confuse the issue. Constructive comments are welcome. The rest of it is not, as the Terms of Use make clear.

May 16, 2011 11:26 AM in response to ds store

ds store wrote:

R C -R,


Your suggesting people who have no computer security experience download malware, try it on their systems and then report what happens just to please the Terms of Use?

Certainly not. I am suggesting that the advice of users like Thomas who have tested this trojan on their own systems justifiably is more credible than the speculative advice of those who have not.

May 16, 2011 11:56 PM in response to R C-R

So posting about the tools and methods used by a security team that was published now is a speculation over a single case study that is not even made with an initial report of the configuration for the machine used in the test?


Ok, this is really enough. Can you please tell us what titles do you and Mr Reed have to say that me or ds store have not any knowledge? Mr Reed has voluntary installed the malware on his system and wrote a page about it on his blog? That's it? For me is not enough about a security issue.

You were the one negating the existence of a file that ds store was talking about, while other users has reported the existence of that file. I'm sorry but if you are still put it on credibility than you have no credibility at all as well.

May 17, 2011 1:32 AM in response to Rayced

Rayced wrote:

So posting about the tools and methods used by a security team that was published now is a speculation over a single case study that is not even made with an initial report of the configuration for the machine used in the test?

You posted nothing specific about any case at all. You mentioned the names of some security specialists, the name of a monitoring tool you represented as the standard, & some vague references to a few types of malware exploits. You have demonstrated no specific knowledge of this malware, of any attempts to analyse it by anyone, or of the security features built into OS X.


Your position is that since you know nothing about this malware, you advise returning the Mac to factory condition. You don't mention anything about how to do that or how to to avoid reinstalling the malware when returning the Mac to a useable state.


You have done nothing but speculate.

Defense: Malware targeting Mac's

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.