Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Defense: Malware targeting Mac's

Mac's users running any browser with JavaScript turned on by default are vulnerable to being tricked into clicking on a trick image and/or link.


That image may appear to be a standard OS X window with a close box or the typical OS X looking window asking a question with OK or Cancel. It can look like anything really, it's purpose is designed to get you to click anywhere on it and initiate a download to your computer.


Safari tries to be helpful and "Open Safe Files" by default, which is being used with numerous success to run code on one's machine, by bypassing the normal user action of 'open the downloads folder and then clicks on the download to run' process in exchange for convenience.


Most Mac's are used with one person, and the initial setup of a new Mac (or a new OS X install) is the first user is automatically a Administrator User. Running one's typical day to day use while in Admin User mode gives any code running on one's machine more privileges and access than it would receive if the user of the computer created another OS X account and ran most of their computer use as a General User.


The ultimate access for rogue code would be Root User, which on Mac's is turned off by default, however a temporary access window to Root User is allowed when a Admin User provides his or her Admin Password. Once rogue code gets Root user access, it's all over, OS X is completely compromised.



The key to security on a Mac, or any computer system actually, is a process called "Compartmentalized Security" where the more privileges code receives, the more it's subjected to time and scrutiny to determine it's legitimacy.


Web browsers are the forward troops facing a overwhelming enemy, the World Wide Web. Not one modern web browser is 100% safe, not Safari, not Firefox, not IE, not Chrome, not Opera. Neither are plug-ins or scripts that run within these browsers 100% safe.


So the key to maintaining security is to provide a high level of "Compartmentalized Security" steps which shifts the exploit potential further down the privilege level so it can't do much of anything or gain further access.


People can get carried away with downloading and installing software in a rapid fire manner, this provides a ripe opportunity for malware to get onto one's computer, even gaining root access right away.



So in order to provide better compartmentalized security, provide more time and steps before potentially installing rouge code. I suggest the following actions:


1: Run most of your day to day computer use as a General User with less privileges. This can be done by creating a new Admin User, logging out of the present user and into the new Admin User, then turning the first user into a General User.


Whenever certain actions are needed, like accessing the Application's folder (where programs can be changed by malware) a Admin Name and Password will be required. A small hassle, but it provides another step for it to get past.



2: Use Firefox web browser and the following Add-ons: NoScript, Ad Block Plus and Public Fox.


Under the Toolbar customization, drag the NoScript button to the toolbar. NoScript turns off all scripts and plug-ins by default, which if you trust the site your on, you click the button for turning them on and the page automatically reloads.


In Public Fox preferences, set a password on downloads, this way a popup window appears before any download occurs, keeping malware from sneaking into your downloads folder and potentially being clicked on.


With Ad Block Plus, subscribe to the Easy List which automatically appears in the browser window. This will auto-update to keep advertising, which has been used numerous times as a attack venue, from appearing.


Click&Clean, Ghostery, BetterPrivacy, FlagFox, WOT, HTTPS-Everywhere (from the Electronic Frontier Foundation) are also highly recommended add-ons.



3: In Safari preferences, turn off "Open Safe Files" install the Ad Block Plus add-on and the Click2Flash add-on. If any add-on appears in the future to simulate what NoScript and Public Fox does on Firefox, then enable those add-ons.



4: Check the staus of your browser plug-ins. These websites makes it easy, bookmark them in a obvious place so you remember to visit them routinely. As soon as a vulnerability appears, either update or turn off the affected plug-in in your browser until a patch is issued.


https://www.mozilla.com/en-US/plugincheck/


https://browsercheck.qualys.com/



5: If you enjoy surfing the backalleys of the Internet and you have at least a decent dual core Intel based Mac, I'd highly advise installing the free VirtualBox and loading a free ISO of Linux Mint DVD 32 bit 10.10 (most consistent and easy to use, everything included, Linux distro)


http://www.virtualbox.org/


http://www.linuxmint.com/download.php


The object is to load and install Linux Mint into the virtual machine like installing a operating system onto a regular computer. Once completed, then save a snapshot to revert to after your Firefox browsing session (in Linux) is completed. All and any potential malware, caches etc is flushed when you revert the entire guest OS back to the earlier state. Keep the Guest OS updated via the Software Update option and save a new snapshot.



6: Use common sense, if it don't look right, then stop and flush the OS X based browser from memory via the Apple > Force Quit menu.


7: Install the free ClamXav, it will remove the OS X malware it knows about, offering some after the fact defense and Windows malware from their files.


http://www.clamxav.com/


I don't advise a full time, always on and running anti-virus solution for Mac's due to Apple's tendancy to change the underlining OS themselves to thwart potential malware. So something like Norton which maintains tight control over OS X should be avoided.


Malware on Mac's are a scarce thing because of Apple's top down approach, but trojans are a potential attack venue and people need to insure more steps to avoid being tricked.

MacBook Pro, Mac OS X (10.6.7), XP, Vista, 7 many Linux distros

Posted on May 8, 2011 4:40 AM

Reply
Question marked as Best reply

Posted on May 8, 2011 5:11 AM

Run most of your day to day computer use as a General User with less privileges.


That causes problems for some apps, which won't run on anything but an admin account or on the account they were installed on. And it's not a guarantee of security - a user who gets in the habit of authenticating to admin to install stuff from their Standard account is no safer than the user who gets in the habit of authenticating to install from their Admin account. This is a good general suggestion, but may not work for everyone and provides practically no real security against "social engineering" by itself.


2: Use Firefox web browser and the following Add-ons: NoScript, Ad Block Plus and Public Fox.


Again, using things like these won't protect you by themselves. How do you know if a site is trusted and should have JavaScript turned on? And most folks are finding this malware via trusted sites that have had malicious JavaScripts "sneaked" into their code, through malicious ads or search engine optimization poisoning. How can you know if your trusted site is affected? And, given how much this malware has been jumping around over the last week, I seriously doubt Ad Block Plus can keep up.


3: In Safari preferences, turn off "Open Safe Files" install the Ad Block Plus add-on and the Click2Flash add-on.


Note that even folks with Safari's Open "safe" files after downloading option turned off have been affected by opening the installer manually. And some have been alerted to the presence of malware by the automatic appearance of the installer. I'd still agree, though, but would add that you should keep your Downloads folder cleaned out, so that any suspicious items that turn up will be easily recognized, and not mistaken for something you downloaded earlier.


As to Click2Flash, I think nobody should be on the web without it! I don't trust Flash as far as I could throw Adobe.


I'd highly advise installing the free VirtualBox and loading a free ISO of Linux Mint DVD 32 bit 10.10


That is not a realistic suggestion for the average person, who will have neither the desire nor the knowledge to run Linux.


6: Use common sense, if it don't look right, then stop and flush the browser from the Apple > Force Quit menu.


This should have been #1! AV software has struggled to keep up with all the variants of MacDefender, malware sites move on sometimes an hour-by-hour basis and malicious code sneaks into trusted sites. In all, no automated defense tool will protect you from a new threat... only your "wetware" can do that!

86 replies

May 17, 2011 5:48 AM in response to Rayced

Please come to your senses, this is not supposed to be for what you guys are doing here. I am getting more notifications than spam and there is nothing that have being said in days that anyone can benefit from.

You know what they say: If you don't have any smart thing to contribute with... I am tired of this drama, let it die already.

May 17, 2011 7:44 AM in response to R C-R

Question: does exist any analysis of the traffic (ie sniffing packets) made by the trojan horse while sitting on a system for a while and free to go online? Because till now all I've read is how to respond to the incident in case the trojan was just installed and its traffic was blocked by Little Snitch (application level firewall).


It's a either a yes or no the answer and has nothing to do with me singing the anthem of my country.

May 17, 2011 8:24 AM in response to Rayced

Rayced wrote:


You lied more than once. That's enough.


That is a personal attack. This may be appropriate in your country, but it is not appropriate here. It is also in violation of the ToU:


  1. Stay on topic. Apple Support Communities is here to help people use Apple products and technologies more effectively. Unless otherwise noted, do not add Submissions about nontechnical topics, including:
    1. Speculations or rumors about unannounced products.
    2. Discussions of Apple policies or procedures or speculation on Apple decisions.
  2. Be polite. Everyone should feel comfortable reading Submissions and participating in discussions. Apple will not tolerate flames or other inappropriate statements, material, or links. Most often, a "flame" is simply a statement that is taunting and thus arbitrarily inflammatory. However, this also includes those which are libelous, defamatory, indecent, harmful, harassing, intimidating, threatening, hateful, objectionable, discriminatory, abusive, vulgar, obscene, pornographic, sexually explicit, or offensive in a sexual, racial, cultural, or ethnic context.
  3. Post constructive comments and questions. Unless otherwise noted, your Submission should either be a technical support question or a technical support answer. Constructive feedback about product features is welcome as well. If your Submission contains the phrase “I’m sorry for the rant, but…” you are likely in violation of this policy.
  4. Do not post polls or petitions or links to same.
  5. Test your answer. When possible, make sure your Submission works on your own computer before you post it.


Unless you have a constructive comment or solution which works on your computer, please refrain from further flames and other inappropriate replies such as accusing a regular contributor of trolling or your post(s) will be reported.

May 17, 2011 9:08 AM in response to WZZZ

Talking about the ToC… Sorry ToU.

I bounce my question cause it's getting covered up by things not pertinent, hoping is not such an "abuse" (like revealing informations that an user didn't put public on the board):


does exist any analysis of the traffic (ie sniffing packets) made by the trojan horse while sitting on a system for a while and free to go online? Because till now all I've read is how to respond to the incident in case the trojan was just installed and its traffic was blocked by Little Snitch (application level firewall).

May 22, 2011 8:00 AM in response to ronaldz

The CNET article quotes something worth thinking about:


"The news stories were making it worse because it makes Mac users worried and they are more convinced that the fake antivirus warning is real," Intego spokesman James said in an interview today. "It's a self perpetuating process."


That process includes some well meaning but uninformed Mac users that overstate the threat this trojan poses to users. It is called "scareware" for a reason: it can't do anything malicious unless users are scared enough to be tricked into installing it, which requires authenticating with an admin ID & password.


Even if you do that, it is installed as a user process with no direct access or ability to alter system domain files. Quitting it using Activity Monitor, moving the app to the trash, & emptying it will stop it from executing anything. Even if you don't remove the login item after doing that, at worst you will see an error notification the next time you log into that account.

May 22, 2011 8:36 AM in response to R C-R

Sure. Keep it and if you dump it don't use the secure trash empty function.

And if you had that trojan running for a while on your Mac, don't worry: just erase (no secure trashing is needed) that app and that's it, you're gonna be fine.


Have you tried this on your system R C-R?

Otherwise is a speculation.

May 22, 2011 4:57 PM in response to Rayced

As far as I can tell, everything you imply this trojan could do is pure speculation, based on absolutely no experience with it, and almost completely ignores the several analyses of its various forms done by A-V companies or by any other source, much less how they suggest removing it.


This isn't a particularly sophisticated attack. It's installer scripts are straightforward -- if they were not, Installer.app would not run them. They don't try to compromise the OS itself. Neither they nor the app contain anything capable of hiding or preserving code in drive sectors the file system thinks are free. Even if they managed that, there is nothing installed that would survive a normal erase left to somehow access those hidden sectors to somehow bring the code back or execute it.


The app is the entire payload. It runs as a user process & has no direct access to system level files or the file system. It certainly can't reboot the Mac or even run itself from a user login item during a safe boot.


If you have any real evidence that the trojan can do any of these things you imply it can do, please present it. Otherwise, do everyone a favor & support the removal techniques that have been shown to work.

Defense: Malware targeting Mac's

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.