background preloader

Year in Mac Security 2009

Facebook Twitter

Security Alert - Mac Trojan Horse OSX.Trojan.iServices.A Found in Pirated Apple iWork 09. Lose/lose: Is it a Game? Is it Malware? It’s Both! Malware Intego’s Virus Monitoring Center has come across an odd new program. Called lose/lose, this is a kind of alien-killer game like the venerable Space Invaders, but with a new twist. As the developer describes it on his web site, Each alien in the game is created based on a random file on the players computer. Hmm… You play a game and it deletes files? Developer Zach Gage claims that this is part of his MFA thesis, and while that’s certainly believable, it seems an odd way to write a thesis: a game that may delete user’s files is, quite frankly, a malicious program.

I would even argue that Lose/Lose does good and not harm, as it’s part of a project bringing this kind of matter to our attention. High-concept art is nothing new, but applying that to malicious computer programs certainly is. Malware as art could be fine in an exhibit, but releasing it in the wild is risky. Comments are closed. Security Memo: Hacker Tool Copies Personal Info from iPhones. Malware Exploit: iPhone/Privacy.ADiscovered: November 10, 2009Risk: Low Description: Following the recent discovery of a worm that changes wallpaper on iPhones, Intego has spotted another piece of malware that attacks iPhones, one that is far more dangerous than the ikee worm. This hacker tool, which Intego identifies as iPhone/Privacy.A, takes advantage of the same vulnerability in the iPhone as the ikee worm, allowing hackers to connect to any jailbroken iPhone or iPod touch (iPhones or iPod touches hacked to allow installation of software other than through iTunes) whose owners have not changed the root password.

It is important to note that standard, non-jailbroken iPhones are not at risk; it is extremely dangerous to jailbreak an iPhone because of the vulnerabilities that this process creates. Hackers using this tool, written in Python, will install it on a computer – Mac, PC, Unix or Linux – then let it work. Comments are closed.

Security Memo: iPhone Worm Creates Botnet, Copies Personal Data. Malware Malware: iPhone/iBotnet.ADiscovered: November 21, 2009Risk: Medium Description: For the third time this month, malware targeting the iPhone has surfaced. The first such malware changed wallpaper on iPhones, and the second harvested personal data from iPhones. This new malware, that Intego calls iBotnet.A, is by far the most sophisticated iPhone malware yet: it is not only a worm, capable of spreading across a network, but also hijacks iPhones or iPod touches for use in a botnet. It is important to note that standard, non-jailbroken iPhones or iPod touches are not at risk; it is extremely dangerous to jailbreak an iPhone because of the vulnerabilities that this process creates.

This worm starts by searching its local network, as well as a number of IP address ranges, for available devices to infect. When active on an iPhone, the iBotnet worm changes the root password for the device (from “alpine” to “ohshit”), in order to prevent users from later changing that password themselves. More Information about the iBotnet Worm that Attacks iPhones.

Malware We reported yesterday about a worm that affects jailbroken iPhones, stealing personal data, directing users to phishing sites, and creating a botnet. Intego’s security specialists have analyzed the code of the iBotnet worm and have found striking similarities with the ikee worm, which we discussed on November 9. What this means is that the newer worm, iBotnet, has used some of the code that was published on-line after the ikee worm was discovered. The creator of the ikee worm thought that his malware was a mere prank, and could alert iPhone users who jailbreak their phones to the security risks they run. However, his releasing the code publicly had the effect that we expected: malware writers – the malicious ones – took advantage of his work to create new, more dangerous malware. Apple agrees with us. In a statement published on The Loop, an Apple spokesperson said, “As we’ve said before, the vast majority of customers do not jailbreak their iPhones, and for good reason.

Security Memo - "ikee" iPhone Worm Exploits ssh Weakness and Changes Wallpaper on Jailbroken iPhones. Security Memo - Java/Evasion.A Java Vulnerability. Security Memo - OSX/Tored.A Proof of Concept Malware. Security Alert - New Variant of Mac Trojan Horse iServices Found in Pirated Adobe Photoshop CS4. Security Memo - The Conficker Worm and Mac OS X. Intego Facebook Timeline: 2009.