eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
1Flashback
First detected in 2011 as a classic Trojan horse, masquerading as an update to Adobe Flash, the malware evolved into a drive-by exploit that infected the systems of Mac users who visited compromised or malicious sites. The malware infections have dropped over the past couple of weeks, from more than 600,000 to about 140,000, according to Symantec, but the damage has been done to Apple’s security reputation.
2Sabpab
Also known as SabPub, the Trojan exploited the same Java vulnerability as Flashback to get into Macs and steal information. It started appearing just as the Flashback malware was getting under control. It appears to be aimed primarily at Tibetan sympathizers, so the threat of widespread infection is not nearly as great at Flashback.
3Tsunami Trojan
Originally written for Linux systems, malware authors apparently ported the Trojan in hopes of hijacking Mac OS X systems, which once compromised, could be used to launch denial-of-service attacks. Detected in October 2011, the Tsunami Trojan apparently was derived from Kaiten, a backdoor Trojan dating back to at least 2002 and aimed at Linux systems.
4OSX/Imuler-B
This Trojan horse reportedly used images of a supermodel, Irina Shayk, who was the cover girl on the March 2012 issue of FHM magazine. The malware authors hoped to lure Mac users into clicking on an image of the scantily clad model, and while the photo appeared on the screen, the malware had opened a backdoor to the Mac and uploaded private data to a remote Web server.
5Trojan-Dropper:OSX.Revir.A
6MacDefender Fake AV
MacDefender, detected in May 2011, was a fake antivirus program that downloaded itself onto a computer. The rogue software used the name of the legitimate MacDefender program in hopes of tricking users into thinking it was the real security software. Once a user clicked on the rogue link, they were directed to a Website containing malicious JavaScript code that displayed a fake scan. Other variants of the fake AV malware also were circulating with names like MacProtector, MacSecurity and Apple Security Center.
7PDF Bug in Safari
In July 2011, a flaw in the Safari Web browser was discovered that, if exploited, could potentially have allowed attackers to remotely take over iPhones, iPads and iPod Touch devices. According to a warning from the German Federal Office for Information Security, the security flaw in Safari could enable attackers to infect users’ iOS devices with malicious software that would give them administrator privileges just by displaying infected PDF files.
8Weyland-Yutani Bot Kit
Danish security researchers in May 2011 discovered a crimeware kit that was for sale for $1,000 that purported to enable attackers to create malware for the Mac OS X platform. The researchers said it represented the first-ever kit for Mac malware that also could steal data entered into a Firefox browser. They said they expected versions for Chrome and Safari to follow, along with others aimed at Apple’s iPad and Linux systems.