etresoft wrote:
In case of ClamAV,
SourceFire bought all trademark and copyright to the project. Many open source projects have corporate sponsors or owners. Open source is big business these days and right in the middle of a number of major corporate rivalries.
ClamXav isn't produced by clamav. clamav is the open source project. ClamXav is the Mac port of the project, undertaken and kept updated by a sole dedicated Mac developer. Maybe if you read more blogs you'd know this.
Trojans masquerade as a particular program and require you to execute them as that program in order to launch their payload. That description only applies to the original Flashback variant, which claimed to be Adobe Flash. Newer versions were Java applets that could be launched from websites (including the ever popular banner ads placed on ad networks, from which they're shotgun-blast distributed across huge swathes of the internet). Visiting a website and getting infected simply by viewing that site precludes the later variants from being called trojans. But having a command & control system is what makes it a botnet.
If you have no antivirus software installed, how exactly do you know you're malware-free? All the users I've personally helped remove flashback from their systems had absolutely no idea they were infected. The only reason I knew they were infected is because of firewall logs (not logs on their system, logs outside their control) that showed their systems accessed the wildcard domain names that flashback uses for C&C. I would not be surprised if, right now, your system is infected while you sit on this forum pontificating about how 99% of users have never been infected. Fate is funny like that; Dale Earnhardt openly mocked drivers who were asking for better safety equipment, only to later die due to lack of safety equipment.
End of the day the reason Macs were rarely infected before isn't because of their security model - it's because virus authors rarely targetted it. Now they are. They're not going to slink back into their little hole and go away - this was a proof of concept. It showed that not only could they infect systems, they could do so very profitably for a very long time, due to the very complacency you've exhibited in this thread. Do you want to know what the difference between Classic MacOS & OS X is? For a long time MacOS had a large enough percentage of the installed base of personal computers to make itself a tempting target for virus authors... now that OS X systems have grown in market share, it again has become a tempting target.
I've personally knocked dozens of Flashback zombies out of comission. More than 10% of the installed base I'm personally responsible for maintaining, with over a dozen more showing up at our second location. Who likely have more infections but, since they take the same lackidaisical approach to security as you do, the only time they've caught infections is when I remote in and point them out. It's very easy to claim that systems aren't infected if you don't bother looking.
BTW, may I suggest you change your forum name to Baghdad Bob?