|
#1
|
||||
|
||||
Trojans for Mac?
A friend mailed me some information about a possible trojans which could be included in iWork '09 and Photoshop CS4 t*rrents. Take a look here. Sry, it's a Google translation.
Anyway, how big is the danger of trojans and viruses in OS X? I don't care a bit about them, but I didn't cared in Windows, too. And I had always less than 10 problematic files on my system which were harmless, only indentified as trojans from my antivirus program. 2 Opteron systems: OSx86 10.5.8, Andy's 9.8.0 kernel, Asus A8N-SLI Premium, Opteron 185 o'clocked @ 2 x 2,95 GHz (2nd system 2.6 GHz), ATI Radeon HD2600XT 256MB Dual-Monitor 2x HP L2035, 4 GB RAM, Griffin FireWave as main audio device, Marvell + nForce LAN, Asus U3S6 USB3/SATA6 card, 5,5 TB harddisk, Firewire 800 card, Apple Remote + eHome IR receiver, 2x Wacom serial graphics tablet, Canon Pixma iP4700, Logitech Internet Navigator wireless keyboard/mouse combination. My Audio stuff: M-Audio Transit USB (default audio), M-Audio ProFire 610, M-Audio ProFire Lightbridge (34 channels) using Creamware A16 ADAT converter • MIDI: M-Audio Midiman 4x MIDI interface • Behringer Audio Mixers: Xenyx 1002, Xenyx 1002FX, Xenyx 1202FX, Eurorack UB1002FX, Eurorack MX1804FX, Eurorack MX262A • FX devices: Lexicon MPX100 DSP, Behringer DSP-1000 Virtualizer, Behringer MiniFEX 800 DSP, Behringer Multicom Pro MDX4400 compressor • RETRO: MSSIAH midi/sequencer/synthesizer cardridge for the C64 (Dual-SID), Steinberg M.S.I. MIDI Interface for C64 |
#2
|
||||
|
||||
Here`s some more info about this :
http://www.appleinsider.com/articles...e_pirates.html Seems like this is the first malicious software for mac spread on mass scale. I wonder what will Apple do about this. www.ultimae.com Panoramic music, for panoramic people. AMD Phenom II X6 3.5Ghz AMD 990FX Chipset Kingston HyperX 16GB 1600Mhz AMD Radeon HD6850 X2 CrossFire Seagate Barracuda Green 2TB |
#3
|
||||
|
||||
Here's another look at the same problem:
http://www.macnn.com/articles/09/04/...botnet.active/ iServices is apparently reaching out to infest Macs with monitoring software and the ability to later gain access to your files through backdoor openers. I'm hoping Apple can help close up these doors but in the meantime don't download this stuff. use reputable sources or buy it for real |
#4
|
|||
|
|||
There is absolutely nothing they can practically do about it. No viable OS can or should stop it's owner from doing something stupid if they choose to. Other than taking control away from the user, the only thing they can do is launch some type of campaign to try to educate their users. |
#5
|
||||
|
||||
I really wouldn't worry about the Mac trojans anyway, they are pretty hard to get infected with, even if you'd try. The worst you can do is shellcode, IMO.
Lenovo D20 8 Core Thinkstation: [Intel 5520 Motherboard | Two Intel Xeon E5504 @ 2GHz | 4GB DDR3 RAM | Mac OS X Snow Leopard 10.6.3 (running in full LP64!) | nVidia Quadro FX 580 Dual HDMI + DVI 512 MB| DVD +RW DL] iBook G4: [14" Mid 2005 | 1 GB RAM | 80 GB HDD | SuperDrive | Mac OS X Leopard 10.5.5] ∞
|
#6
|
||||
|
||||
i think it's too easy to get rid of them, so why to worry about?
CPU: Intel Pentium Dual E2140 1.6 GHz. Graphics: Intel(R) 82945G (128 MB). Board: Asus P5GC-TVM/S Chipset: Intel Lakeport-G i945GC. HDD: 232 Gb S-ATA Samsung Version 10.6.2 32bit. Kernel: Vanilla. Audio: VoodooHDA 0.2.2 with prefpane. Video: Stock GMA. PS2 fix: VoodooPS2 USB 2 not working Acer Aspire 4530-6823 CPU: AMD Athlon™ X2 QL-62 2.0GHz. Graphics: Integrated GeForce® 9100M G. Chipset: nForce® MCP77MH. |
#7
|
|||
|
|||
Yeah, it's not like a simple shell script could wipe out your entire drive on the next restart.... oh, wait...
Aside from the fact that you're completely wrong and anyone can install anything they please once they get someone to type in their root pass. |
#8
|
||||
|
||||
Quote:
Most people don't know for what they type their passwords in half of the time (remember, the general Apple consumer is not that tech savvy if at all) and just do it automatically. Lenovo D20 8 Core Thinkstation: [Intel 5520 Motherboard | Two Intel Xeon E5504 @ 2GHz | 4GB DDR3 RAM | Mac OS X Snow Leopard 10.6.3 (running in full LP64!) | nVidia Quadro FX 580 Dual HDMI + DVI 512 MB| DVD +RW DL] iBook G4: [14" Mid 2005 | 1 GB RAM | 80 GB HDD | SuperDrive | Mac OS X Leopard 10.5.5] ∞
|
#9
|
||||
|
||||
Quote:
I have examples and code that demonstrate how this can be done... It is quite unsetteling that it is possible to infect an universal binary with a smaller trojan (being prior to the other executable) which next executes the other binary after launch... I've tested this with a hello world app injected before zip... It showed "Hello world!" and next the help with zip --help... I hope Apple will figure out a way around this... phrack.org has a full article (and old example code which can be adapted) under the article: XNU Wars a new hope... I would recommand allways checking the binaries inside the executables with file (under Terminal)... The extra part does show up and if one opens the 0xCAFEBABE universal binary with a hex editor one can easily see the extra links being done at the start... Last edited by andyvand; 05-02-2009 at 01:08 AM. |