Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Apple
    • Apple
    • Cybersecurity
    • Development
    • PC Hardware

    Mac Malware Mainly Low-Risk Proofs of Concept in 2010

    Written by

    Fahmida Y. Rashid
    Published January 21, 2011
    Share
    Facebook
    Twitter
    Linkedin

      There were a number of Mac-specific threats in 2010, and security researchers became more vocal about Mac security. In fact, Intego, a Mac security vendor for Virus Barrier x6, published its first annual review of Mac threats on Jan. 20.

      Calling 2010 a “busy year” for Mac security and malware, Intego highlighted in its report proof-of-concept malware and “trickware” that emerged in 2010, security vulnerabilities discovered in the operating system, and iOS security.

      Koobface, the cross-platform worm that spread via Facebook, Twitter and MySpace, was a “serious problem” but was poorly coded, making the threat very low, Intego said. When users navigated to sites infected with Koobface to view videos, the sites attempted to install a malicious Java applet. Users were alerted by a dialog asking if they wanted to install an applet. Koobface did highlight, however, the likelihood that more virus authors will use Java to create cross-platform malware that targets non-Windows machines as well.

      While actual Mac malware in the wild remained relatively rare, Intego pointed out ways the threats could have been worse. An example was OpinionSpy, spyware installed by free screen savers. OpinionSpy was intended to be a benign tool collecting information on users’ browsing habits, but its features could open backdoors, inject code into applications and download new code without users being aware, said Intego.

      Intego found on various forums a variant for HellRTS, which opened a backdoor on computers running OS X to give remote users the ability to take control and execute commands. This variant was not found in the wild, but it can lay dormant indefinitely as the authors figure out new delivery mechanisms, Intego said.

      Another example of proof-of-concept malware that never made it onto users’ Macs was “ransomware,” which could encrypt and password-protect files on users’ computers. To unlock the files, an infected user would have to pay the authors ransom. It was found on a few blogs but not in the wild, Intego said. The report noted that the proof-of-concept was based on a feature, not a bug, in Mac OS X, which would make it difficult to defend against.

      Intego’s Virus Monitoring Center also saw a “large number” of RSPlug malware, which dates back to 2007. Windows malware tends to peter out pretty quickly after initial infection as antivirus and other security products learn to detect and remove them. With a majority of Mac users still not installing an antivirus application, older threats seem to hang around longer, so RSPlug can do as much DNS tampering in 2011 as it did when it was discovered in 2007.

      Mac and iOS users are at low risk from serious security problems, but they need to increase their awareness of phishing attacks as well as Web and application-based threats, Intego said. At the moment, most Mac malware requires users to willingly install and actually grant administration privileges before it can infect a machine. However, malware will try to mislead non-security savvy users into authorizing installations of suspicious software or steal money through phishing sites and e-mail scams, Intego said. There were a number of phishing scams in 2010 pretending to be from Apple as well, Intego said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×