• This forum is for posting news stories or links from rumor sites. When you start a thread, please include a link to the site you're referencing.

    THIS IS NOT A FORUM TO ASK "WHAT IF?" TYPE QUESTIONS.

    THIS IS NOT A FORUM FOR ASKING QUESTIONS ABOUT HOW TO USE YOUR MAC OR SOFTWARE.

    This is a NEWS and RUMORS forum as the name implies. If your thread is neither of those things, then please find the appropriate forum to ask your question.

    If you don't have a link to a news story, do not post the thread here.

    If you don't follow these rules, then your post may be deleted.

New OS X Trojan affects 10.4.6 and lower.

Joined
Mar 9, 2004
Messages
9,065
Reaction score
331
Points
83
Location
Munich
Your Mac's Specs
Aluminium Macbook 2.4 Ghz 4GB RAM, SSD 24" Samsung Display, iPhone 4, iPad 2
According to Techweb, a new trojan has been found, that takes advantage of a security hole in launchd that Apple fixed in their recent 10.4.7 update.

Upon successful installation (it's not clear whether the users password is required), the flaw gives the attacker root access to the system.

Users of 10.4.7 are not affected by this issue, as Apple fixed the issue with the update. All other users are urged to update their systems!

http://www.techweb.com/wire/security/189800241;jsessionid=DYDXM4DJXFYTSQSNDLPSKHSCJUNN2JVN
 
B

Badger

Guest
Isn't wonderful how the companies that want to sell us anti-virus stuff are the ones who announce the new viruses? There is nothing about this on the CERT site (http://www.us-cert.gov/current/current_activity.html). Most reports point out that this is a proof-of-concept piece of coding that was posted on a hacker website after Apple publicized the flaw. There has been no report of it being found in the wild.
 
OP
Aptmunich
Joined
Mar 9, 2004
Messages
9,065
Reaction score
331
Points
83
Location
Munich
Your Mac's Specs
Aluminium Macbook 2.4 Ghz 4GB RAM, SSD 24" Samsung Display, iPhone 4, iPad 2
Yeah, I was sceptical when I saw 'Symantec' as well...

But I do find it interesting that the malicious coders are now taking the approach that they've been using with Microsoft for a while now, waiting for patches and then releasing code to take advantage of the flaw on unpatched systems.
 
Joined
Mar 17, 2006
Messages
312
Reaction score
17
Points
18
Location
Texas
Your Mac's Specs
Mac mini i5, 2.3Ghz dual core, 8 GB RAM, OSX 10.8.2
Interesting that the article at Symantec was written by "Costin Ionescu", who's otherwise known to work for BitDefender, a Romanian competitor of Symantec.

Keep it up, you SOBs, keep proving my point*

*point being, viruses are written by the sellers of anti-virus software. How else would one explain how they are taken utterly by surprise when some rogue _does_ write an actual, un-expected virus?
 
Joined
Jan 29, 2005
Messages
790
Reaction score
13
Points
18
Location
Legoland
Urr Viruses.

Caught one myself last week and still have a bit of a runny nose from it. Those summer viruses are the worse. :cool:
 
M

mrfu

Guest
I'll be happy if Apple stays as the premiere brand with less customers. That way we can continue to live our happy lives without trojans, viruses and spyware....
 
Joined
Mar 17, 2006
Messages
312
Reaction score
17
Points
18
Location
Texas
Your Mac's Specs
Mac mini i5, 2.3Ghz dual core, 8 GB RAM, OSX 10.8.2
By Victor Mihailescu, Apple News Editor

Another month, another so called OS X exploit/security attack, these incidents are becoming a common occurrence, the only thing that does not change is the fact that is it all FUD.

This latest threat comes in the form of code that makes use of a locally exploitable vulnerability in the "launched" portion of the system, that handles the start-up items. Of course, Symantec was all over it, and issued a security alert that warned “attackers may exploit this issue to execute arbitrary code with elevated privileges."

As usual, once you actually get down to looking at the actual facts, this vulnerability is downright hilarious. While the vulnerability was there, it was fixed in the latest system update from Apple, which was released last Tuesday. However, the actual exploit for this vulnerability, the code that could potentially use it, was released last Wednesday by Kevin Finisterre, a security researcher at Digital Munition.

Basically, what we’re looking at here is an exploit that was created in a lab, to take advantage of a flaw that was fixed before the exploit was created… scary.

Since this exploit is not, nor has it ever been in the wild, the chances of it affecting anyone are minimal. If the user has upgraded to the latest version of the OS, then the risk of being affected is non-existent.
 
Joined
Oct 10, 2004
Messages
10,345
Reaction score
597
Points
113
Location
Margaritaville
Your Mac's Specs
3.4 Ghz i7 MacBook Pro (2015), iPad Pro (2014), iPhone Xs Max. Apple TV 4K
Why do I not find this surprising. The fact that there was an extreme lack of details, like the requirement for a password to install the malicious code, made me immediately skeptical.
 
Joined
Jan 14, 2005
Messages
2,078
Reaction score
155
Points
63
OSX will never reach the dangerous levels of Windows. Even Microsoft learns, and I bet we will see a pretty solid release with Vista, at least on the security level.

OS X is pretty safe, and Apple is quick, I mean, this virus was "launched" after Apple already had the hole fixed - something impossible to date with Windows (talk SP2 release date).

OS X will stay safe. And Apple will try get more customers, but they're consumer base will stick to a special kind of people who can afford these things. Common john is not going to buy a mac from 5th avenue.
Rather common upeer-middle-class john.

Apple doesn't target putting computers in little schools in Ghana or India - that's not what they do. Unfortunate, but we can't all be angels of welfare like Bill Gates.
 
Joined
Feb 27, 2005
Messages
940
Reaction score
59
Points
28
Location
Framingham, MA
Your Mac's Specs
MacBook C2D 2.4 2GB
yogi said:
OSX will never reach the dangerous levels of Windows. Even Microsoft learns, and I bet we will see a pretty solid release with Vista, at least on the security level.

I agree with you, a big problem with Windows is Microsoft policies. Apple has a different behavior towards its costumers. BTW, i'm not so optimistic about Vista.

yogi said:
OS X is pretty safe, and Apple is quick, I mean, this virus was "launched" after Apple already had the hole fixed - something impossible to date with Windows (talk SP2 release date).

As it was noted on the first post, this is how problems started with Windows, attacking the repaired holes. However, since it is a lot easier to update OSX, i don't think this is a major threat.

yogi said:
OS X will stay safe. And Apple will try get more customers, but they're consumer base will stick to a special kind of people who can afford these things. Common john is not going to buy a mac from 5th avenue. Rather common upeer-middle-class john.

Here i disagree with you, anyone can get an old Mac Mini, "get" Tiger and start messing with the code. Or even worse, just turn your old Dell or similar and "get" the Tiger developer version, no money involved. This is just a matter of time, not money.

yogi said:
Apple doesn't target putting computers in little schools in Ghana or India - that's not what they do. Unfortunate, but we can't all be angels of welfare like Bill Gates.

Gates doesn't give away computers, he invests in future costumers.

Just one question, this is suposed to affect 10.4.6 and lower versions, does this inlcudes Panther?
 
Joined
Mar 30, 2004
Messages
4,744
Reaction score
381
Points
83
Location
USA
Your Mac's Specs
12" Apple PowerBook G4 (1.5GHz)
Kar98 said:
Interesting that the article at Symantec was written by "Costin Ionescu", who's otherwise known to work for BitDefender, a Romanian competitor of Symantec.

Keep it up, you SOBs, keep proving my point*

*point being, viruses are written by the sellers of anti-virus software. How else would one explain how they are taken utterly by surprise when some rogue _does_ write an actual, un-expected virus?

There's nothing surprising or conspiratorial about this. Symantec and the like employ "security researchers" whose job is to find vulnerabilities in software. If nobody did this, then many of the bugs would never be fixed, until some hacker exploited them.

The two possibilities are

1. Researcher finds problem
2. Researcher reports problem to vendor
3. Vendor fixes problem
4. Problem is announced to public

or

1. Hacker finds problem
2. Hacker exploits problem
3. General public is at risk, systems are compromised, and all **** breaks loose
4. Vendor races to patch problem
5. Vendor fixes problem, but damage is done.

Sooner or later, the vulnerabilities are going to be discovered. It's better that a "friendly" security researcher finds a vulnerability than some hacker. Yes, of course the security researchers have an interest in finding them. Otherwise, nobody but the criminally-minded ever would.
 
B

Badger

Guest
Or...
1. Vendor finds problem
2. Vendor fixes problem
3. Vendor publicises problem and releases update
4. Hacker creates an exploitation of problem
5. Security companies use situation to spread FUD and promote products
At least it was not announced by Symantec's marketing director the way McCaffee did with the last scare.
 
Joined
Feb 17, 2006
Messages
688
Reaction score
26
Points
28
Your Mac's Specs
iMac 17" Intel Core Duo 1.83GHz 512 MB Ram 128 vRAM 60GB HD
another reason to stay updated
 
Joined
Oct 10, 2004
Messages
10,345
Reaction score
597
Points
113
Location
Margaritaville
Your Mac's Specs
3.4 Ghz i7 MacBook Pro (2015), iPad Pro (2014), iPhone Xs Max. Apple TV 4K
Tis is like standing up in a movie theater and yelling "FIRE". Except that everyone in the theater is a firefighter and the only fire we see is from the cigarette lighter in the yellers hand
 
Joined
Mar 30, 2004
Messages
4,744
Reaction score
381
Points
83
Location
USA
Your Mac's Specs
12" Apple PowerBook G4 (1.5GHz)
Badger said:
Or...
1. Vendor finds problem
2. Vendor fixes problem
3. Vendor publicises problem and releases update
4. Hacker creates an exploitation of problem
5. Security companies use situation to spread FUD and promote products
At least it was not announced by Symantec's marketing director the way McCaffee did with the last scare.
In this case, it was an outside researcher.
Credit to Kevin Finisterre of DigitalMunition for reporting this issue.
If you look at Apple's Security Updates page, and click any random update, you'll find half or more of them give "credit" to some outside person for reporting the issue to Apple.
 
Joined
Nov 11, 2003
Messages
228
Reaction score
3
Points
18
Location
London
Your Mac's Specs
G5 2ghz Dual Processor, 12" Scrolling TrackPad Powerbook
It's quite simple, don't look at nasty porn sites and your computer won't get aids!
 
Joined
Jan 14, 2005
Messages
2,078
Reaction score
155
Points
63
johnnyluu said:
It's quite simple, don't look at nasty porn sites and your computer won't get aids!

I doubt I will get this trojan by looking at stupid porn sites.

Btw, my line about Bill Gates and Angel of welfare should be read with a flavour of irony and sarcasm :) . But you get a kudo for your excellent reply post.
 
C

Cole 505

Guest
baggss said:
Tis is like standing up in a movie theater and yelling "FIRE". Except that everyone in the theater is a firefighter and the only fire we see is from the cigarette lighter in the yellers hand

OMG :closed: lmao heh heh....

I guess because I'm a fire medic I find it especially humorous!

But that is quite a visual Baggss;
If I shared what we'd all do(firefighters) :doctor:
to the person with that lighter after the word "fire"
was spoken....well I suppose either every citizen would
feel shocked :D or some may begin to utter a few bwaahaa's giddily
to themselves?!! :cool:
--- thanks for a laugh to start my day
 
Joined
Dec 18, 2005
Messages
2,288
Reaction score
51
Points
48
Location
Devon, England
Your Mac's Specs
ibook g4, imac 2ghz c2d, mbp 2.4ghz c2d - 10.5.1
Aptmunich said:
According to Techweb, a new trojan has been found, that takes advantage of a security hole in launchd that Apple fixed in their recent 10.4.7 update.

Upon successful installation (it's not clear whether the users password is required), the flaw gives the attacker root access to the system.

Users of 10.4.7 are not affected by this issue, as Apple fixed the issue with the update. All other users are urged to update their systems!

http://www.techweb.com/wire/security/189800241;jsessionid=DYDXM4DJXFYTSQSNDLPSKHSCJUNN2JVN



thanks for the info. i updated as soon as the 10.4.7 came out so i am 99% sure i wont be affected. i dont look at bad sites anyway.

cheers
 

Shop Amazon


Shop for your Apple, Mac, iPhone and other computer products on Amazon.
We are a participant in the Amazon Services LLC Associates Program, an affiliate program designed to provide a means for us to earn fees by linking to Amazon and affiliated sites.
Top