
http://www.zdnet.com/blog/bott/what-a-mac-malware-attack-looks-like/3269
Well, that didn’t take long.
After I posted my analysis of why the time is right for bad guys to begin attacking the Mac in earnest, I heard from two readers who had encountered in-the-wild attacks on Macs in their respective workplaces. In both cases, the results showed up via Google Image Search. (This is an increasingly common source of malware, as security researcher Brian Krebs points out in a well-timed blog post today.)
I was able to duplicate these results and encountered an identical attempt from this same campaign to convince me to install a rather nasty Trojan on a Mac. (Sophos has an analysis of what this particular species does.) I uploaded the sample—a Mac installer package in a Zip file—to Virustotal.com, which confirmed that it is indeed the same code.
Remember last month when I showed you a malware attack that was targeting Google Chrome users? In a follow-up post, I wondered whether Macs would be far behind. They aren’t.
I just did a search for radioactive tsunami waves on Google and then clicked the Images button. On the second page of search results, I found one that looked legit:
Trojan construction kit for Mac OS X - yours for $1,000
A Mac trojan is just clicks away.
Source: Krebs on Security According to security specialist Brian Krebs, in recent weeks a developer has been touting a trojan construction kit called Weyland-Yutani on underground forums; it enables criminals to construct malware for Mac OS X with just a few clicks. Construction kits of this type have previously only been available for Windows. The malware builder, which costs $1,000, generates malware for monitoring keystrokes that allows criminals to steal login credentials or credit card details – similar to the Windows trojans ZeuS and SpyEye.
Unlike on the Windows ecosystem, no exploit kits for Mac OS X are at present able to inject malware undetected onto a system via security vulnerabilities. The attacker always needs to persuade a victim to run an infected file, usually by means of social engineering, for example, on sites such as Facebook.
Weyland-Yutani hooks into Chrome and Firefox to monitor keystrokes entered into form fields. The developer told Krebs that he is also working on tapping into Safari, which comes preinstalled under Mac OS X. Like its Windows cousins, the Mac malware supports 'web injects' – addons which are able to modify web site content in real-time.
On top of this, Intego reports that in recent days a highly professional piece of scareware, MAC Defender, has been circulating. It is more than a match for well-known Windows counterparts, warning the user that their computer is infected and opening pornographic sites every couple of minutes to reinforce this impression.
To stop websites from running installation programs automatically, deactivate the "Open 'safe' files after downloading" checkbox. The scareware program finds its way onto the user's computer as a zip archive as a result of a visit to a crafted web site. If a user is surfing with Safari, the download starts automatically and the installer contained within the archive is, by default, launched without user intervention. To stop this behaviour, users need to deactivate the checkbox under the Safari menu: Preferences, General, Open 'safe' files after downloading. The user is asked for their password before the scareware is installed.
(crve)