The word on the street is that a trojan now exists for MacOS X that exploits a “root” vulnerability in Apple Remote Desktop Agent in Mac OS X 10.4 and 10.5:
“The Trojan horse runs hidden on the system, and allows a malicious user complete remote access to the system, can transmit system and user passwords, and can avoid detection by opening ports in the firewall and turning off system logging. Additionally, the AppleScript.THT Trojan horse can log keystrokes, take pictures with the built-in Apple iSight camera, take screenshots, and turn on file sharing. The Trojan horse exploits a recently discovered vulnerability with the Apple Remote Desktop Agent, which allows it to run as root.”
The Apple Remote Desktop Agent that this article speaks of is the piece of software that is built into MacOS X that allows you to control your computer from another computer. The details of the vulnerability in question has been discussed at length at Slashdot. If you’re a home user, you’d likely never have to use this aspect of Mac OS X, so I would follow these directions to protect yourself.
A second trojan disguises itself as a poker game to get onto your system. Once there, it does the following:
“The Trojan horse, when run, activates ssh on the Mac on which it is running, then sends the user name and password hash, along with the IP address of the Mac, to a server. It asks for an administrator’s password after displaying a dialog saying, “A corrupt preference file has been detected and must be repaired.” Entering the administrator’s password enables the program to accomplish its tasks. After gaining ssh access to a Mac, malicious users can attempt to take control of them, delete files, damage the operating system, or much more.”
This sounds nasty, but it requires your interaction to do any sort of damage. Therefore you need to practice safe computing and never download and install software from untrusted sources or questionable web sites. Also, if something suddenly appears on your Mac asking you for your password, and you are NOT installing software or changing system settings, don’t type your password in.
Now that Apple has raised the profile of the Mac, you can fully expect to see more of this as hackers and script kiddies target the Mac. Hopefully Apple steps up its game to keep its user base safe. Given that it has been criticized in the past for not doing that, I hope this forces them to improve their repsonse to issues like these.
Today’s Mac Trojan Uses MS Word To Do It’s Evil Deeds….. Fanbois Now Hysterical
Posted in Commentary with tags Mac, Security, Trojan on April 17, 2012 by itnerdIt just gets worse for Mac users. ZDNet is reporting that a new Mac Trojan is making the rounds and it uses a MS Word exploit to get onto your system and run amok:
The new version of the Trojan uses malformed Word documents to open a backdoor for remote hackers to steal information or install further code. Just like many recent variants of Mac-specific Trojans, OS X users may be caught off guard as there is no prompt to enter your username or password when the malicious software installs itself onto your Mac.
One key point. It doesn’t require any user interaction other than opening the infected Word document. Now how do you protect yourself? Make sure that your copy of Office for Mac is up to date. The exploit that this Trojan uses dates back to 2009. So if you’re up to date, you’re safe. Of course this shouldn’t stop you from running an Anti-Virus application. I’ll be posting a list of such applications later today. Watch for it.
In the meantime, Mac fanbois will continue to weep openly now that their myth of Mac superiority in the security realm is proven to be false.
Leave a comment »