Apple, Mac, iOS4, iPad, iPhone and (in)security...
10.0K views | +0 today
Follow
Apple, Mac, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Noch 550.000 Macs mit Flashback verseucht

Noch 550.000 Macs mit Flashback verseucht | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Trotz gegenteiliger Meldung: Noch 550.000 Macs mit Flashback verseucht
Obwohl Zahlen von Kaspersky erst etwas anderes sagten, warnt Dr. Web davor, den Apple-Ausnahmezustand vorzeitig zu beenden. Laut seiner aktuellen Statistik seien noch immer 556.000 Macintoshs infiziert. Dieser Ansicht schließt sich auch Symantec an.

 

Sollten die Zahlen von Dr. Web korrekt sein, steht Apple noch viel Arbeit bevor. Bislang hat das Unternehmen drei Java-Updates veröffentlicht. Das jüngste soll Flashback von Macs mit OS X Lion und OS X Snow Leopard entfernen. Diese Updates sind aber nur effektiv, wenn sie auch installiert werden, was nach Untersuchungen von Sicherheitsforschern nicht alle Nutzer machen. Zudem verwenden rund 17 Prozent der Mac-Anwender eine ältere Version von Mac OS X, für die es keine Sicherheitsupdates gibt. Das entspricht rund 10 Millionen Apple-Computern.

 

Unabhängigen Sicherheitsexperten zufolge handelte es sich bei Flashback um die bislang größte Infektion von Apples Mac-Plattform.

 

===> Die Zeiten, in denen Mac OS als immun gegen Schaftsoftware aller Art galt, seien endgültig vorbei. <===

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flashback-Welle auf Macs bereits eingedämmt?

Flashback-Welle auf Macs bereits eingedämmt? | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Die Sicherheitsexperten von Kaspersky melden, dass nur noch 30.000 Rechner mit dem Mac-Trojaner Flashback infiziert wären. Dr.Web geht hingegen von 566.000 Betroffenen aus.

 

 

 

===> Für Systeme mit einer älteren Version als Mac OS X 10.6 gibt es derzeit jedoch kein offizielles Java-Sicherheitsupdate!!! <===

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Interview : Flashback et la mécanique d'un malware

Interview : Flashback et la mécanique d'un malware | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Le retour récent dans l'actualité du malware Flashback a remis en avant les questions de sécurité autour du Mac.

 

Les auteurs de ces malware ont également un total contrôle des Mac infectés et peuvent installer et exécuter de nouveaux codes natifs OS X, via le processus de mise à jour de Flashback. Je l'ai observé dans une de mes boîtes virtuelles (un OS X fonctionnant dans une machine VMware), un binaire shell a été installé et un malfaiteur a exécuté des commandes shell sur cette machine virtuelle, pour vite s'apercevoir de la supercherie (on peut voir ces machines virtuelles comme des chèvres attachées à un piquet…, ndr). À mon avis la personne à l'autre bout avait un doute sur l'infection réalisée… et il avait raison.

 

Veuillez lire plus, très intéressant...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac users may think they're safe from malware, but they're not

Mac users may think they're safe from malware, but they're not | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Kate Bevan: For too long Mac users have been complacent about malware – it's time they woke up to the threat from trojans like Flashback...

 

===> Mac users should 'become responsible members of the wider computing community.' <===

 

Read more...

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Java update is no protection against new SabPub Mac Trojan

Java update is no protection against new SabPub Mac Trojan | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Java update is no protection against new SabPub Mac Trojan!

 

SabPub Mac Trojan is spreading via Word documents, using an ancient vulnerability...

 

Read more...

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

SabPub : un nouveau cheval de Troie identifié sur Mac OS X

SabPub : un nouveau cheval de Troie identifié sur Mac OS X | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Repéré par des chercheurs de chez Kasperky, le malware SabPub exploite une fois encore une faille de sécurité Java dans Mac OS X via des documents Word piégés.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac OS X : après Flashback, voici le cheval de Troie SabPub

Mac OS X : après Flashback, voici le cheval de Troie SabPub | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Découvert par Kaspersky, ce nouveau malware qui cible les Mac exploite une faille de sécurité Java.

 

Le répit aura été de courte durée. À peine Apple avait-il publié une mise à jour de Java contenant un logiciel de suppression du malware Flashback qu’un nouveau fléau était découvert. Baptisé SabPub, il a été découvert par l’éditeur Kaspersky qui en a repéré deux variantes.

 

Comme Flashback, SabPub passe par une faille de sécurité de Java au moyen d’un document Word piégé. Le Mac infecté va ensuite se connecter à un site web depuis lequel sont envoyées des commandes. Un pirate peut notamment obtenir des captures d’écran du Mac de la victime.

 

Cependant, le mode de diffusion de ce malware via des documents Word piégés rend sa propagation moins puissante que celle de Flashback qui a touché 600 000 machines de par le monde.

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Symantec: Flashback malware now down to 140K machines

Symantec: Flashback malware now down to 140K machines | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

The Flashback malware is still on the decline, but the security firm says its latest estimate of infected machines is higher than expected. 

 

In a blog post today, software maker and security firm Symantec lowered its estimate of machines that still have the malware to 140,000, which is down considerably from estimates of more than 600,000 less than two weeks ago. Even so, the firm said it was expecting a lower tally.

 

Read more...

more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

FLAMING RETORT: All this new Mac malware - whose fault is it?

FLAMING RETORT: All this new Mac malware - whose fault is it? | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Flaming Retort is back, this time trying to Coole and Explayne the flames we've had from some Mac users in the past few days.

In a back-to-front way of making Mac fans feel better, I'll start bymaking everyone feel slightly worse, taking a small potshot at Windows, OS X and Linux fans alike.

 

My point here is not to prove that it is somebody's fault, but simply to remind us that perennially finding someone else to blame for our computer security woes is a bad idea. ...

 

===> Security is the responsibility of all of us: technologists, coders, mobile phone users, writers, video watchers, bloggers, Wikipedia readers, bank clerks, bicycle couriers, politicians, policemen and gardeners. <===

 

            ===> It's not your fault. It's your responsibility. <===

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Checking for the new PubSab malware in OS X

Checking for the new PubSab malware in OS X | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

This new minimum-threat malware development for OS X copies Flashback and suggests criminals jump on opportunistic bubbles. 

 

Recently the Flashback malware attacks on OS X gained headlines, not because of the presence of the Trojan, which had been around for some months prior to the increase in attention, but rather because it gained the possibility of installation in a drive-by-download attack that did not require any interaction from the user in order to install.


This development was made possible because of a vulnerability in Java that allowed for a maliciously crafted applet to break the Java sandbox and write files to the disk. Apple has since patched this issue and it, along with other companies, have released Flashback Trojan removal tools to combat the malware; however, in its prime, the malware did reach more than 600,000 Mac users.

 

Read more...

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky warnt vor neuem Mac-Trojaner

Kaspersky warnt vor neuem Mac-Trojaner | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Die Sicherheitsexperten von Kaspersky warnen vor einem neuen Mac-Trojaner, der nach dem Flashback-Schädling erneut auf Apple-Anwender abzielt.

 

Der Flashback-Trojaner schaffte es vor wenigen Tagen binnen kürzester Zeit über 700.000 Macs zu infizieren und zu einem Teil eines Botnetzes zu machen. Der Schädling demonstrierte damit, dass Mac-Nutzer keineswegs sicher vor Online-Kriminellen sind.

 

Der von Kaspersky Lab neu entdeckte Schädling wurde auf den Namen SabPub getauft und verbreitet sich über Word-Dokumente.

 

Dabei wird dieses Mal die bereits bekannte Java-Schwachstelle CVE-2009-0563 ausgenutzt. Die Online-Kriminelle nutzen SabPub zum Aufbau eines Botnetzes, das unter anderem für Datenspionage genutzt wird.

 

Kaspersky warnt:"Das Schadprogramm wird via Spear Phishing – einer sehr zielgerichteten Phishing-Attacke – verbreitet.

 

Als Social-Engineering-Trick wird das Thema Tibet/Dalai Lama ausgenutzt, wie dies auch im so genannten „Lucky Cat“-Fall geschehen ist."

 

Read more...

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Did the Mac malware wake-up call fall on deaf ears?

Did the Mac malware wake-up call fall on deaf ears? | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Many Mac users still refuse to understand what the successful Flashback attack really means.

 

No one, Apple included, ever said that OS X was immune


Maybe not "immune," but Apple has run ads over the last decade strongly implying that Macs lack the malware and security problems of Windows. In fact, some of the comments I received reiterated that very notion.

 

===> Mac users are still resisting the idea that their platform has become a popular attack target and that those attacks are succeeding. <===

 

Read more to have a realistic vue ;) and stop dreaming!

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple releases Flashback malware removal tool, for OS X Lion only

Apple releases Flashback malware removal tool, for OS X Lion only | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
In its ongoing battle against the widespread Flashback malware attack, Apple has released a standalone removal tool.

 

===> The downloadable utility is available exclusively for Mac owners running OS X Lion. It will not run on Mac OS X 10.6 (Snow Leopard) or earlier versions. <===

 

Apple has not officially acknowledged the discontinuation of support for users of pre-Snow Leopard versions of OS X. Under the “Additional information” heading in its bulletin describing the Flashback malware, the company says: “For Macs running Mac OS X v10.5 or earlier, you can better protect yourself from this malware by disabling Java in your web browser(s) preferences.”

 

Several security companies have reported the discovery of a different malware variant that appears to attack the same Java vulnerability.

 

===> Like Flashback, this new Trojan requires no user interaction to infect your Apple Mac. Kaspersky refers to it as “Backdoor.OSX.SabPub.a” while Sophos calls it at “SX/Sabpab-A.” <===

 

Read more...

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flashback Spread via Hijacked WordPress Blogs

Flashback Spread via Hijacked WordPress Blogs | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
The massive Flashback botnet of Mac machines relied on hacked and malware-rigged WordPress blog sites to spread and infect users, according to Kaspersky Lab researchers.

 

Flashback Slashed
We now know where the infection originated, and we have a number of removal tools available to get rid of the infection. But there is some disagreement on exactly how many Macs are still infected with Flashback, nearly two weeks later. Kaspersky researchers said a little over 30,000 Macs are still infected, as of Apr. 19. The biggest drop in the infections came after Apple released its final Java update to patch the flaw and remove the malware, according to Kaspersky Lab.

 

On the other hand, Symantec researchers claimed there were still 140,000 infected machines.

"The statistics from our sinkhole are showing declining numbers on a daily basis. However, we had originally believed that we would have seen a greater decline in infections at this point in time, but this has proven not to be the case," Symantec said.

 

Read more...

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware Flashback : l’infection serait descendue à 30 000 Mac

Malware Flashback : l’infection serait descendue à 30 000 Mac | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Selon l’éditeur de sécurité Kaspersky, il ne reste plus que 30 000 Mac infectés par le malware Flashback à la date du 19 avril, contre 600 000 une dizaine de jours plus tôt.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flashback malware infections drop to 30,000 Macs

Flashback malware infections drop to 30,000 Macs | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
The Flashback malware threat for OS X is on a steep decline, but still underscores that Mac systems are not immune to threats. Read this blog post by Topher Kessler on MacFixIt.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

New Mac Trojan: Sabpab

New Mac Trojan: Sabpab | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

A new Trojan known as “Sabpab” could hurt Mac users who run Java and Microsoft Word. Security researchers are warning users to make sure their computers

 

===> have the latest software updates from both Apple and Microsoft, <=== and to use anti-virus software.

 

In some cases, manual removal of Sabpab may be needed.

 

Word about Sabpab comes on the heels of another nasty piece of malware, Flashback, that infected up to as many as 600,000 Macs, security experts said, by exploiting a vulnerability in Java software.

 

Apple last week issued a software-base removal tool for that malware, which can be used by criminals to steal personal information, including passwords.

 

Read more...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

D'autres chevaux de Troie, moins graves que Flashback, ont visé Mac OS X

D'autres chevaux de Troie, moins graves que Flashback, ont visé Mac OS X | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
D'autres chevaux de Troie, moins graves que Flashback, ont visé Mac OS X - Malware - Après avoir découvert le Cheval de Troie Flashback sur Mac, les...
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flashback botnet decline not as fast as expected

Flashback botnet decline not as fast as expected | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Given the attention that the Flashback Mac malware has received since the discovery of the 600K strong botnet of computers infected with it and the number of tools that various security firms and Apple issued for its removal, it's somewhat disheartening to hear that===> the botnet still counts around 140,000 zombies. <===

 

Read more...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

SabPub : un nouveau trojan agressif sur Mac

SabPub : un nouveau trojan agressif sur Mac | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Alors qu'Apple et plusieurs éditeurs en sécurité viennent de publier des correctifs pour venir à bout du cheval de Troie Flashback, un nouveau malware s'invite actuellement sur Mac OS X. Son nom : Backdoor.OSX.SabPub.a.

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac Trojan 'SabPub' Proves Cybercriminals Actively Target OS X

Mac Trojan 'SabPub' Proves Cybercriminals Actively Target OS X | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

"SabPub" proves Macs are now targets of Advanced Persistant Threats (APTs), a persistent type of cyber attack operated by cyber criminals, Kaspersky Lab confirmed.

 

In an update to the ongoing SabPub saga, Kaspersky's researchers reported some unusual activity once the SabPub payload was dropped in its machine bait over the weekend.

 

===> The attackers were actively analyzing the computer's contents, clearly searching for something: <===

 

Read more...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Technology News: Malware: Flashback Mac Trojan Sputters and Stalls

Technology News: Malware: Flashback Mac Trojan Sputters and Stalls | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
A week after the Flashback Trojan began running rampant on Macintosh computers, the malware appears to be in remission.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Two Mac Trojans: Apple Patching Fast Enough?

Two Mac Trojans: Apple Patching Fast Enough? | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Attackers behind the Flashback and SabPub malware likely reverse-engineered a Java vulnerability patched for Windows almost two
months ago by Oracle.

 

Apple, which normally refuses to comment on any vulnerabilities in its products until after it's released a fix, broke with tradition by last week confirming that it was coding an OS X upgrade to nuke Flashback.

 

===> According to various security firms, approximately 600,000 Macs had been infected by Flashback, which makes it the largest malware infection to ever hit OS X users. <===

 

In addition, Kaspersky managed to tie the botnet to six malicious Microsoft Word documents that it's seen in the wild, two of which drop the SabPub vulnerability, and four of which drop the MaControl bot, which appears to be an earlier effort by the same virus writers. One key difference, however, is that MaControl didn't target the Java vulnerability exploited by Flashback and SabPub.

 

===> Another is that SabPub managed to remain active for about six weeks before anyone detected it. <===

 

Read more...

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

New Mac malware uses Flashback Java exploit

New Mac malware uses Flashback Java exploit | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Apple's decision to push out a Flashback malware removal tool for OS X Lion bundled with a new Java security update has proven to be rather fortunate, as a new Mac OS X threat has been discovered taking advantage of the vulnerability (CVE-2012-0507) exploited by the latest Flashback variants.

 

The security update in question configures the Java web plug-in to disable the automatic execution of Java applets in browsers, a move that should prevent users from inadvertently falling victim to similar drive-by malware attacks in the future.

 

 

In the meantime, those who haven't installed the update are at risk of getting their machines compromised by a newly detected backdoor Trojan that Kaspersky Lab researchers dubbed SabPub.

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Five OS X security threats that fizzled

Five OS X security threats that fizzled | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
In the aftermath of Flashback—one of the highest profile malware attacks on the Mac—Ars takes a look back at other security threats that didn't quite make such a big blip on the radar.

 

===> As Apple continues to increase its share of the PC market, Macs are becoming a viable target for malware authors, sprouting a handful or two of trojans in the last decade. <===

 

Here are five in particular that were considered (by some) to be harbingers of a great malware infestation for OS X that instead proved to be more bark than bite.

 

more...
No comment yet.