Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Mac Malware/poisoned images

Two detailed articles that go into greater depth of the malware attacking Mac users.



http://www.securelist.com/en/blog/6211/Rogueware_campaign_targeting_Mac_users


http://blog.unmaskparasites.com/2011/05/05/thousands-of-hacked-sites-seriously-p oison-google-image-search-results/




If your new to the party:


Mac targeted trojans are making their rounds mostly by poisoned images from Google.


The exploit depends upon Javascript, you can choose to turn it off in Safari preferences, however large portions of the web don't display or operate correctly without Javascript running.


A easier preventative option would be to use Firefox and the NoScript Add-on, use Firefox toobar customization to drag a NoScript button to the toolbar.


NoScript turns off all scripts and plug-ins by default, which you enable on a per site, per need, per visit type basis by clicking the NoScript button.


Firefox also has a pop-up window with a opt out before the downloads occurs, another safety step.


If you have click happy types types, it's advised to install the Public Fox ad-on as well, set a password on the broswer downloads.



If you have the trojan web page on your Mac's screen, simply use Apple Menu > Force Quit to quit the browser.


If you've downloaded but not run the installer, delete it immediatly from your downloads folder.


If you've installed the trojan and gave it your admin password, you need to backup your files to a external drive and c boot off the installer disk and Disk Utility > Erase with Zero your whole boot drive and reinstall OS X fresh, re-install all programs from original sources, scan your files with a AV software and then return them to your computer.


If you gave the AV software your credit card information, you need to call the credit card company and cancel the charge and freeze it. Assume your identity has been stolen and take appropriate action to defend your identity.


http://www.ftc.gov/bcp/edu/microsites/idtheft/



Some other advice:


Use only low amount debit/credit cards online with amounts your willing to risk losing.


Do not enable overdraft protection with these on line type cards.


Maintain the bulk of your funds in more secure, no user electronic access accounts (keep the blame for loss entirely on the bank)


Beware that banks and credit card companies like to increase your credit/debit card limits without notice.


If you lose a considerable amount of funds through a electronic means in your control, like a ATM, credit card, debit card or on line banking, expect a very long and tiresome legal battle to hopefully regain those funds and prove fault.



(note: I receive no compensation from mentioning these sites/article or their solutions, etc)

MacBook Pro, Mac OS X (10.6.7), 17" Quad XP, Vista, 7, Linux(s)

Posted on May 13, 2011 9:15 AM

Reply
100 replies

May 13, 2011 6:53 PM in response to ds store

I'd like to challenge whoever marked this as the correct answer. I do not believe for a moment that giving the Mac OS Security popup your password when requested by the installer would allow the installer package to access the password at all, let alone send it anywhere. I would be willing to bet that even the installer application only receives an up or down from the security software and doesn't retain the password.

May 13, 2011 7:34 PM in response to WZZZ

The installer is an Apple application. That is the only thing that receives your password.


Well that just goes to show how lame these particular malware writers are, huh? 🙂


Several people in the past few weeks have reported getting the Trojan download from hotmail. Has anyone figured out how this is happening? Though it's not at all clear from his initial post if it's the Trojan, here's someone who may be getting it from gmail.


https://discussions.apple.com/thread/3055969?tstart=0


Hotmail/Windows Live Mail rollout is just the mega-hot bed of malware transfer between PC users.


I compare it to like giving prisoners cell phones, where they can better communicate and orchestrate their nefarious behavior.


Every couple of weeks I have to clean this lady's computer, she won't quit Hotmail and she turns off UAC, I threaten to lock her machine down every time.

May 13, 2011 7:46 PM in response to MadMacs0

MadMacs0 wrote:


I'd like to challenge whoever marked this as the correct answer. I do not believe for a moment that giving the Mac OS Security popup your password when requested by the installer would allow the installer package to access the password at all, let alone send it anywhere. I would be willing to bet that even the installer application only receives an up or down from the security software and doesn't retain the password.


Well the original poster accidentailly gave hiimself the correct answer, even when he didn't post a question in the first place. 😉


Obviously the new forums still need some work, like being able to remove the correct answer and bestowing fortunes on others who need them. 🙂


Trust me, the there isn't much going on in the Lounge, just some casual chitchat and alerting the hosts to this or that.

May 14, 2011 4:10 AM in response to ds store

So a root level installer from the same people who are attempting to deliver a Trojan is to be trusted?


We're talking about a specific threat here, not something theoretical. Have you actually analyzed the installer or anything else about this trojan? I would swear, from some of the things you're saying, that you have not actually seen it and are just reporting on stuff you've heard third-hand... some of it not remotely accurate.


Yes, there's always the possibility this thing could change into something else. There is no evidence that that has happened, despite some wild speculations here. Lots of things could happen that never do, and if it does, it won't exactly stay a secret.


We really don't need you continuing to spread FUD and inaccurate information about this trojan here. It is not helping anyone.

May 14, 2011 7:05 AM in response to thomas_r.

Thomas A Reed wrote:


So a root level installer from the same people who are attempting to deliver a Trojan is to be trusted?



Thomas,


That question was addressed to another poster and answered. Please review the thread.




Thomas A Reed wrote:


We're talking about a specific threat here, not something theoretical. Have you actually analyzed the installer or anything else about this trojan? I would swear, from some of the things you're saying, that you have not actually seen it and are just reporting on stuff you've heard third-hand... some of it not remotely accurate.


Yes, there's always the possibility this thing could change into something else. There is no evidence that that has happened, despite some wild speculations here. Lots of things could happen that never do, and if it does, it won't exactly stay a secret.


We really don't need you continuing to spread FUD and inaccurate information about this trojan here. It is not helping anyone.


I'm not going to play with any malware on a $4,000 machine if I can't know for certain I can flash the firmware(s) and scan or Zero hidden partitions. Any place 1's and 0's exist in software, I need to be able to replace them with copies I can verify the source.


I'm certainly not going to spend the considerable effort to analyze every version of the malware (if I could get a hold of them all) and play constant catch-up, changing my removal instructions as the malware changes.


I'm not going to assume that what a user is reporting on the screen is indeed the exact same malware underneath and certainly not going to remote analyize to confirm my removal instructions are accurate and I'm not leaving people I advise computers in the hands of a botnet.


I'm certainly not going to be used as a unwitting tool by malware authors who change the code underneath at a moments notice or selectively, knowing only parts of their malware will be removed by my soon to be outdated instructions on my blog site.


Rather, I'm going to advise people if the give anything malicious their admin password, to assume the worse and take appropriate action. Backup/Zero/Re-install.


Excuse me, I'm late to my charity Windows support group where I repair comptuers for free, and advise people to get Mac's. 😉

May 14, 2011 7:21 AM in response to ds store

I'm not going to play with any malware [...]


I'm certainly not going to spend the considerable effort to analyze every version of the malware [...]


Then why did you start this thread yourself, including inaccurate information obtained through third-hand (possibly fourth- or fifth-hand) sources? If you aren't willing to analyze this trojan, don't advise people on how to deal with this trojan. If you want to offer advice for dealing with malware in general, fine, I don't really have a problem with that.

May 14, 2011 8:03 AM in response to ds store

ds store wrote:

Am I making sense?

Not even remotely.


In the first place, malware authors are interested in profit, not playing games. They know they may have just one shot to convince any given user to install their code, & they aren't going to waste it on some "low grade" version.


In the second, a trojan can't magically evolve into some other, more potent kind of malware threat, as you seem to think it can. Trojans are the simplest, least technically sophisticated kind of malware there is.


You seem to know very little about this particular trojan & even less about malware in general. I suspect you have read a bit about one or maybe more Black Hat proof of concept exploits, but don't understand what they actually have proven or what would be required to turn them into viable malware that could be deployed over the Internet.


You don't seem to understand what does & doesn't survive a HD erase or reformat, what part EFI plays in the boot process, the limitations on firmware-based exploits, the difference between an Apple & third party app, how processes gain root level access or the restrictions on that, or for that matter even how the anti-virus software you sometimes recommend as an effective solution to this trojan works.


Your only real justification for your latest recommendations boil down to "maybe there will be more potent stuff in the future." While that is certainly a possibility, each new type of threat will require an appropriate, measured response, based on what it actually can & can't do. Your suggestions that (variously) a "complete Zero & install" or even a hard drive replacement either will or won't completely eliminate the threat just create fear & confusion without actually helping anybody.

May 14, 2011 8:30 AM in response to ds store

ds store wrote:

Rather, I'm going to advise people if the give anything malicious their admin password, to assume the worse and take appropriate action. Backup/Zero/Re-install.

And I'm going to advise people to remember that for good reason the terms of use for ASC advise users to Test your answer. When possible, make sure your Submission works on your own computer before you post it.


It would seem you have not done this, or even examined the malware without installing it, nor or you willing to defer to those like Thomas who have. I know you are trying to be helpful but you are just confusing users with hearsay & wild speculation, much of it not based on any known facts or evidence.


It might be time to give this a brief rest & do a little more research.

May 14, 2011 10:54 AM in response to thomas_r.

Thomas A Reed wrote:


Then why did you start this thread yourself, including inaccurate information obtained through third-hand (possibly fourth- or fifth-hand) sources? If you aren't willing to analyze this trojan, don't advise people on how to deal with this trojan. If you want to offer advice for dealing with malware in general, fine, I don't really have a problem with that.


The correct way to deal with this Trojan, or any malware for that matter that gains root access, is to do a complete eradication and a factory restore to ensure all software is from verifiable sources. If the user can't do that, then they need to seek profesisonal help.


If Apple produces documentation whereas the firmware gets flashed and hidden partitions removed, I will also advise those steps.


I will not advise half baked solutions, I will not allow any possibility of malware returning if I can all help it.


I am here to help my fellow Apple user, I have no ulterior motive.


http://www.tomshardware.com/news/bios-virus-rootkit-security-backdoor,7400.html

Mac Malware/poisoned images

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.