InfiniteMac OSx86

InfiniteMac OSx86 (http://infinitemac.com/forum.php)
-   Lounge (http://infinitemac.com/forumdisplay.php?f=12)
-   -   Trojans for Mac? (http://infinitemac.com/showthread.php?t=2628)

naquaada 04-18-2009 06:35 PM

Trojans for Mac?
 
A friend mailed me some information about a possible trojans which could be included in iWork '09 and Photoshop CS4 t*rrents. Take a look here. Sry, it's a Google translation.

Anyway, how big is the danger of trojans and viruses in OS X? I don't care a bit about them, but I didn't cared in Windows, too. And I had always less than 10 problematic files on my system which were harmless, only indentified as trojans from my antivirus program.

Taisto 04-18-2009 08:06 PM

Here`s some more info about this :

http://www.appleinsider.com/articles...e_pirates.html

Seems like this is the first malicious software for mac spread on mass scale. I wonder what will Apple do about this.

nfoav8or 04-19-2009 12:12 AM

Here's another look at the same problem:
http://www.macnn.com/articles/09/04/...botnet.active/

iServices is apparently reaching out to infest Macs with monitoring software and the ability to later gain access to your files through backdoor openers.

I'm hoping Apple can help close up these doors but in the meantime don't download this stuff. use reputable sources or buy it for real ;)

Dies 04-19-2009 12:50 PM

Quote:

Originally Posted by Taisto (Post 24925)
I wonder what will Apple do about this.

Quote:

Originally Posted by nfoav8or (Post 24942)
I'm hoping Apple can help close up these doors...


There is absolutely nothing they can practically do about it. No viable OS can or should stop it's owner from doing something stupid if they choose to.

Other than taking control away from the user, the only thing they can do is launch some type of campaign to try to educate their users.

MoC 04-20-2009 05:12 PM

I really wouldn't worry about the Mac trojans anyway, they are pretty hard to get infected with, even if you'd try. The worst you can do is shellcode, IMO.

erick2red 04-20-2009 07:47 PM

i think it's too easy to get rid of them, so why to worry about?

Dies 04-21-2009 01:50 AM

Quote:

Originally Posted by MoC (Post 25010)
The worst you can do is shellcode, IMO.

Yeah, it's not like a simple shell script could wipe out your entire drive on the next restart.... oh, wait... :eek:

Aside from the fact that you're completely wrong and anyone can install anything they please once they get someone to type in their root pass.

MoC 04-21-2009 08:59 PM

Quote:

Originally Posted by Dies (Post 25018)
Yeah, it's not like a simple shell script could wipe out your entire drive on the next restart.... oh, wait... :eek:

Aside from the fact that you're completely wrong and anyone can install anything they please once they get someone to type in their root pass.

I was talking from a damage-to-the-system perspective (if I make sense) because even the Mac trojans that are out there really don't do much damage anyway... But yes, authentification is required to run scripts that require administrative access.

Most people don't know for what they type their passwords in half of the time (remember, the general Apple consumer is not that tech savvy if at all) and just do it automatically.

naquaada 04-21-2009 09:27 PM

If a trojan is hidden in an installer package you can't do anything against it. It could happen very easy in the OSx86 scene: Hey, here's the driver package for the nVidia GeForce 280GTX! Oh yeah, lets install... you have to type your password and you're lost. I think especcially in the scene we should exactly know which package is made from which person. Maybe someone should create a fully new installer only for OSx86 packages, so that we're independent to the Apple installer.

I think viruses which damage the software or the harddisk contents only are rather uncommon today, mostly they want to connect to the net. For this a personal firewall could be handy, I'm using Little Snitch. I'm blocking nearly every program which wants to eatablish an internet connection, even only for updates or something else. Even Quicktime Player and VLC aren't allowed to access the net. Of course, this is no total safety, but it's better than nothing. I have a shell script which is hidden in a .jpg file and can establish system access. But it doesen't any ham, it was an example from Heise Security, a german newspage.

erick2red 04-21-2009 09:56 PM

Quote:

If a trojan is hidden in an installer package you can't do anything against it.
We can open the package with Pacifist and look into it? dont we?
Then if there's a threat, we can act in consequence.

Taisto 04-21-2009 10:02 PM

If you know that there is something which shouldnt be there - for example the known thing with iWork, than yes, maybe you can avoid itd. But usually users dont know that there might be some extra package with malicious software inside - thats the bad thing. I wonder how it will develop - Mac users are quite easy target for this kind of things as most of them are 100% sure that Macs are resistant to all "bad windows things" what well, is not true...

naquaada 04-21-2009 11:01 PM

Viruses are everywhere. I even had one on my C64! Normally you type LOAD"$",8 to get the directory of a floppy disk, if you do this on an infected disk you got a reverse bar LOAD">",8,1 diplayed, like a normal disk command. If you load this, you'll get the directory shown. If you examine the disk with GEOS or an directory editor you'll find two additional files, named < and >. If you delete one of these files you couldn't read the directory with LOAD"$",8 anymore. I'm not sure, but I had a feeling this thing copied itself on other disks.The directory of C64 disks is very easy to manipulate, you can save ascii control codes in normal filenames, so if you save a BASIC program with the command SAVE"HI"+CHR$(147),8 every time the screen will be cleared if you're listing the directory. Another thing is, the Commodore floppy drives have it's own CPU, ROM and RAM which is independent from the computer. So it's always possible that the computer's RAM is virus-free, but the memory of the disk station is still infected.

A friend had the one-half-virus on this DOS machine, I think it was a 486. This nasty virus installed one half in the MBR, the other half was attached to any other file which was found. If the MBR was rewritten, f.e. by a virus prog which only checks the MBR, then all files on the harddisks aren't readable anymore...

On the Amiga viruses were mostly in the bootblocks on the disks which was 1K in size. Normally they didn't do any harm, but it was nasty, and the viruses spreaded heavily because at these times the disk copying and sharing was very common in school. The Amiga has an extreme good capability for reset-proof memory, so a virus could stay all the day in the RAM. Another Virus was the SADDAM virus which infected L: Disk-Validator, a tool which checked the integrity of a disk or harddisk. This tool was on any disk, so this virus wasn't funny at all. Since Kickstart 2.0 the DIsk-Validator was stored in the ROM, so the virus was outdated.

At these times viruses had cool names, Byte Bandit, Lamer Exterminator... today its mostly a stupid Win32/somethingelse.

MoC 04-22-2009 01:57 AM

:-B Off Topic :-B

My favorite DOS virus (I forgot the name) but you used to have EDIT or some other editor open (I forget) and you would start working and after half the page was filled with writing, the text would fall off the screen. Loved it, I still have a copy!

Dies 04-22-2009 03:30 PM

Quote:

Originally Posted by erick2red (Post 25064)
We can open the package with Pacifist and look into it? dont we?
Then if there's a threat, we can act in consequence.

Like Taisto said, you would first have to know exactly what is supposed to be there and what's not. Then you would also need to ensure that what is supposed to be there hasn't been modified in any way.

You would also have to examine any scripts ( preflight, postflight ), since you could easily include a payload in one of those scripts without modifying any of the other contents.

i.e.

Code:

mkdir -p /System/InstallAtStartup/Scripts
touch /System/InstallAtStartup/Scripts/1
cat > /System/InstallAtStartup/Scripts/1 << EOF

# Do your dirty work here with full root priviledges while system loads ;-)

EOF

What you could do from that script is only limited by your imagination - bash skills. :D


BTW, I completely agree with whoever said that this should be an even bigger concern within the "OSX86" scene. That's why I think a retail install with only those mods that are absolutely necessary is the best way to go.

erick2red 04-22-2009 04:39 PM

@Dies, @Taisto: My point is, if we can open the package, with an alter if enough so we don't get caught by that. It's not like we need to crack a binary file or something to get rid of it.
JUST SOMEONE TELLS AND YOU CAN DO IT YOURSELF.

naquaada 04-22-2009 04:41 PM

What do you do if the trojan hides in an system file of the installer package, f.e. Resources/InstallationCheck? Ow man, we're listing a massive listing of ideas here...

erick2red 04-22-2009 05:13 PM

Ok there's always a trick, you can always win, but man, there's great harm, at least were so far from MS software.... Since i'm became part of the community i heard about two or three threats, and man, two month ago MS reported like hundreds of its. I'm so happy about using this safe.
The other point, is real too:
Quote:

Originally Posted by Dies
No viable OS can or should stop it's owner from doing something stupid if they choose to.


naquaada 04-22-2009 05:33 PM

That's for sure: The main error source always sits before the computer :D

andyvand 05-02-2009 01:05 AM

Quote:

Originally Posted by naquaada (Post 24923)
A friend mailed me some information about a possible trojans which could be included in iWork '09 and Photoshop CS4 t*rrents. Take a look here. Sry, it's a Google translation.

Anyway, how big is the danger of trojans and viruses in OS X? I don't care a bit about them, but I didn't cared in Windows, too. And I had always less than 10 problematic files on my system which were harmless, only indentified as trojans from my antivirus program.

Yeah it is possible to infect an OS X binary using universal binaries...
I have examples and code that demonstrate how this can be done...
It is quite unsetteling that it is possible to infect an universal binary with a smaller trojan (being prior to the other executable) which next executes the other binary after launch...
I've tested this with a hello world app injected before zip...
It showed "Hello world!" and next the help with zip --help...
I hope Apple will figure out a way around this...
phrack.org has a full article (and old example code which can be adapted) under the article: XNU Wars a new hope...
I would recommand allways checking the binaries inside the executables with file (under Terminal)...
The extra part does show up and if one opens the 0xCAFEBABE universal binary with a hex editor one can easily see the extra links being done at the start...