Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
12.4K views | +1 today
Follow
Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

iWorm infiziert tausende Macs

iWorm infiziert tausende Macs | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
iWorm infiziert tausende Macs
Antiviren-Experten haben ein aus über 18.000 Macs bestehendes Botnet entdeckt. Der zugrunde liegende Schädling wurde Mac.BackDoor.iWorm getauft und wird über BitTorrent verteilt. Apple hat bereits reagiert.

Der AV-Hersteller Dr. Web hat eine Malware namens Mac.BackDoor.iWorm entdeckt, die es auf Mac-Nutzer abgesehen hat. Ist der Schädling auf dem Mac aktiv, setzt er sich selbst auf die Liste der automatisch beim Rechnerstart zu öffnenden Applikationen und versucht die IP-Adresse eines Command-and-Control-Servers (C&C-Server) herauszufinden.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
iWorm infiziert tausende Macs
Antiviren-Experten haben ein aus über 18.000 Macs bestehendes Botnet entdeckt. Der zugrunde liegende Schädling wurde Mac.BackDoor.iWorm getauft und wird über BitTorrent verteilt. Apple hat bereits reagiert.

Der AV-Hersteller Dr. Web hat eine Malware namens Mac.BackDoor.iWorm entdeckt, die es auf Mac-Nutzer abgesehen hat. Ist der Schädling auf dem Mac aktiv, setzt er sich selbst auf die Liste der automatisch beim Rechnerstart zu öffnenden Applikationen und versucht die IP-Adresse eines Command-and-Control-Servers (C&C-Server) herauszufinden.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

17,000 Macs hit by malware botnet, with help from Reddit

17,000 Macs hit by malware botnet, with help from Reddit | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Security researchers believe that they have uncovered a new botnet, which has recruited thousands of Mac computers.


According to their report, the sophisticated malware – which they have dubbed Mac.BackDoor.iWorm – has infected more than 17,000 computers running OS X.

Computers that have been hijacked could have information stolen from them, further malware planted upon them, or be used to spread more malware or launch spam campaigns and denial-of-service attacks.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Security researchers believe that they have uncovered a new botnet, which has recruited thousands of Mac computers.


According to their report, the sophisticated malware – which they have dubbed Mac.BackDoor.iWorm – has infected more than 17,000 computers running OS X.

Computers that have been hijacked could have information stolen from them, further malware planted upon them, or be used to spread more malware or launch spam campaigns and denial-of-service attacks.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Multi-platform threat exploits old Java flaw, gains persistence.

 

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.

 

The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on.

 

Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

 


Via Gust MEES
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux

 

more...
Scooped by Gust MEES
Scoop.it!

Flashback Spread via Hijacked WordPress Blogs

Flashback Spread via Hijacked WordPress Blogs | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
The massive Flashback botnet of Mac machines relied on hacked and malware-rigged WordPress blog sites to spread and infect users, according to Kaspersky Lab researchers.

 

Flashback Slashed
We now know where the infection originated, and we have a number of removal tools available to get rid of the infection. But there is some disagreement on exactly how many Macs are still infected with Flashback, nearly two weeks later. Kaspersky researchers said a little over 30,000 Macs are still infected, as of Apr. 19. The biggest drop in the infections came after Apple released its final Java update to patch the flaw and remove the malware, according to Kaspersky Lab.

 

On the other hand, Symantec researchers claimed there were still 140,000 infected machines.

"The statistics from our sinkhole are showing declining numbers on a daily basis. However, we had originally believed that we would have seen a greater decline in infections at this point in time, but this has proven not to be the case," Symantec said.

 

Read more...

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Macs under attack, who is safe?

Macs under attack, who is safe? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

April 17, 2012 — Network World — It was always thought that as Apple products increased in popularity, so would the target on its back placed by cybercriminals. Always looking to take down the king of the hill, cybercriminals finally got to Apple's Macs last week with a botnet that attacked more than 600,000 machines.

 

With such an accomplishment, the question is who is really safe from these attacks? The quick answer is no one. Anonymous has proven that.

 

One expert said recently, "it's the malware lurking in the background from these attacks that is truly scary. "Right now advanced persistent malware is very expensive to do right and is not being produced by very many organizations, but it is getting cheaper, it's going to get modularized and mass produced."

 

Read more...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Two Mac Trojans: Apple Patching Fast Enough?

Two Mac Trojans: Apple Patching Fast Enough? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Attackers behind the Flashback and SabPub malware likely reverse-engineered a Java vulnerability patched for Windows almost two
months ago by Oracle.

 

Apple, which normally refuses to comment on any vulnerabilities in its products until after it's released a fix, broke with tradition by last week confirming that it was coding an OS X upgrade to nuke Flashback.

 

===> According to various security firms, approximately 600,000 Macs had been infected by Flashback, which makes it the largest malware infection to ever hit OS X users. <===

 

In addition, Kaspersky managed to tie the botnet to six malicious Microsoft Word documents that it's seen in the wild, two of which drop the SabPub vulnerability, and four of which drop the MaControl bot, which appears to be an earlier effort by the same virus writers. One key difference, however, is that MaControl didn't target the Java vulnerability exploited by Flashback and SabPub.

 

===> Another is that SabPub managed to remain active for about six weeks before anyone detected it. <===

 

Read more...

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple issues Trojan removal tool

Apple issues Trojan removal tool | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple has released a fresh Java update, designed to remove the Flashback Trojan malware that exposed Macs to a botnet.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware Flashback : Apple prépare son patch et contacte les FAI

Malware Flashback : Apple prépare son patch et contacte les FAI | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
La firme de Cupertino a publié une page spéciale Flashback sur son site de support et indique préparer son propre patch. Apple aurait aussi contacté des FAI et des bureaux d'enregistrements pour tenter d'éradiquer le botnet.

 

Apple sort enfin de son silence. Quelques jours après avoir poussé, sans faire référence à Flashback, une mise à jour de sécurité pour Java sur Mac (voir notre article sur le botnet Flashback), Apple hausse un peu le ton. Et publie sur son site de support une page spécifique au fameux malware qui, d’après Dr.Web, infecterait désormais quelque 655 700 machines.

agrandir la photo


===> Une drôle de page tout de même qui n’explique pas comment faire pour savoir si l’on a été effectivement infecté par Flashback, ni comment supprimer le virus de sa machine ! <===

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac Flashfake removal tool

Mac Flashfake removal tool | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

In response to the recent discovery of the Flashfake botnet, Kaspersky Lab has announced the availability of its free Flashfake Removal Tool.

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple Snubs Firm That Discovered Mac Botnet, Tries To Cut Off Its Server Monitoring Infections

Apple Snubs Firm That Discovered Mac Botnet, Tries To Cut Off Its Server Monitoring Infections | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Dr. Web's chief executive Boris Sharov, who says Apple never responded when the firm shared its findings on the Flashback botnet.

 

“They told the registrar this [domain] is involved in a malicious scheme. Which would be true if we weren’t the ones controlling it and not doing any harm to users,” says Sharov. “This seems to mean that Apple is not considering our work as a help. It’s just annoying them.”

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

#Mac Flashback/Flashfake/how to know if you are infected?

#Mac Flashback/Flashfake/how to know if you are infected? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

WHAT IS FLASHBACK/FLASHFAKE?

 

It is a family of malware for Mac OS X. The first versions of this type of threat were detected in September 2011. In March 2012 over 600 000 computers worldwide were infected by Flashback.

 

The infected computers have been combined in a botnet which enables cybercriminals to install additional malicious modules on them at will.

 

Check for FREE online (Kaspersky) if your Mac is infected and learn HowTo...

 

Also users can check if they’re infected with Flashfake by using Kaspersky Lab’s free removal tool http://support.kaspersky.com/downloads/utils/flashfake_removal_tool.zip

 

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac Malware Outbreak is Bigger Than "Conficker"

Mac Malware Outbreak is Bigger Than "Conficker" | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
The Flashback Trojan has compromised an estimated 600,000 plus Macs, making it comparable to the massive Conficker worm botnet.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flashback botnet: The end of the Mac’s malware immunity?

Flashback botnet: The end of the Mac’s malware immunity? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Read 'Flashback botnet: The end of the Mac's malware immunity?' on Digital Trends. A new variant on Flashback malware exploits a Java vulnerability to...

 

But the day may come — soon — when the Mac malware universe warrants widespread use of high-quality antivirus software.

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

New OS X backdoor malware roping Macs into botnet

New OS X backdoor malware roping Macs into botnet | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
New malware targeting Mac machines, opening backdoors on them and roping them into a botnet currently numbering around 17,000 zombies has be...


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
New malware targeting Mac machines, opening backdoors on them and roping them into a botnet currently numbering around 17,000 zombies has be...


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Yes, Hackers Could Build an iPhone Botnet—Thanks to Windows

Yes, Hackers Could Build an iPhone Botnet—Thanks to Windows | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
A reminder to Apple and smug iPhone owners: Just because iOS has never been the victim of a widespread malware outbreak doesn’t mean mass iPhone hacking isn’t still possible. Now one group of security researchers plans to show how to enslave an entire botnet of Apple gadgets through a perennial weak point—their connection to vulnerable…



Gust MEES's insight:

A reminder to Apple and smug iPhone owners: Just because iOS has never been the victim of a widespread malware outbreak doesn’t mean mass iPhone hacking isn’t still possible. Now one group of security researchers plans to show how to enslave an entire botnet of Apple gadgets through a perennial weak point—their connection to vulnerable…


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple-Targeting Flashback Botnet Still Kicking, But Shrinking By 100,000 Macs Per Week - Forbes

Apple-Targeting Flashback Botnet Still Kicking, But Shrinking By 100,000 Macs Per Week - Forbes | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Dr. Web's count of Macs actively infected with Flashback over time. The "A" marks Apple's release of its Flashback removal tool, and the "B" marks Dr. Web's discovery of another variant of Flashback that led to an increase in its infection count.

 

===> Flashback has been used for click fraud, as detailed by Symantec’s researchers. The malware redirected traffic from Google search ads to its own pay-per-click ads, generating as much as $10,000 a day. <===

 

Even with its command and control servers disabled, the infected machines continue to engage in that traffic-hijacking. And with nearly half a million users still infected, Flashback’s authors are still likely profiting from their scheme.

 

Read more...

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flashback botnet decline not as fast as expected

Flashback botnet decline not as fast as expected | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Given the attention that the Flashback Mac malware has received since the discovery of the 600K strong botnet of computers infected with it and the number of tools that various security firms and Apple issued for its removal, it's somewhat disheartening to hear that===> the botnet still counts around 140,000 zombies. <===

 

Read more...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

'Flashback' virus shows Macs more vulnerable

'Flashback' virus shows Macs more vulnerable | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Because Mac laptops' market share has grown so much, it appears Macs are being targeted more.

 

I hope the very legitimate sense of security Mac users have long had isn’t turning into a false sense of security.

 

“For years, Mac users have been able to believe that they are safer than the average computer user and turned their noses up at antivirus software. But as Apple’s market share has grown, so has the threat to Mac users’ security,” the Washington Post reports. Specifically, the Post was referring to a virus called “Flashback” that may have infected “up to 600,000 Macs … mostly in the United States and Canada” which seem now to be part of growing bonnet.” A botnet is a network of “bots” (also called “zombie networks”) that are basically compromised computers – infected computers that are obviously no longer controlled entirely by their owners.

 

Flashback “should be a wake-up call to those who still think that their Mac is invulnerable to attacks like this,” the Posts added.

 

The security advice offered in the article sounds a whole lot like what PC owners have been told for very a long time:

 

Read more...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Sabpab, new Mac OS X backdoor Trojan horse discovered

Sabpab, new Mac OS X backdoor Trojan horse discovered | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
More Mac malware has been discovered, capable of giving remote hackers access to your Apple Mac.

Isn't it time you ran anti-virus software on your Mac?

 

And just like Flashback, the new Trojan doesn't require any user interaction to infect your Apple Mac.

 

The Sabpab Trojan horse exploits the same drive-by Java vulnerability used to create the Flashback botnet.

 

===> It's time for Mac users to wake up and smell the coffee. Mac malware is becoming a genuine issue, and cannot be ignored any longer. <===

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flashback botnet shrinks, downloads of Mac AV software rise

Flashback botnet shrinks, downloads of Mac AV software rise | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

News that nearly two percent of all Mac users have had their computers infected by the Flashback malware which roped them into a 600K strong botnet has hit the Mac community with the realization that ===> their machines are not as secure as they believed and hoped they are. <===

 

Meanwhile, the Flashback botnet has shrunk in the last few days and as of yesterday, counts less than 270k infected machines.

 

According to Symantec, part of the reason for this dramatic decrease is the fact that a number of security firms have executed sinkholing operations against the botnet, but the biggest reason likely lies in the fact that many Mac users have heard the news and proceeded to scan and disinfect their machines.

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

What's the Worst the Mac Flashback Trojan Could Do?

What's the Worst the Mac Flashback Trojan Could Do? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
A look at what the Mac Flashback Trojan could do to infected computers.

 

So what is the worst it could do?

 

Although the Trojan is now only conducting click fraud scam by hijacking people’s search engine results inside their web browsers, it has the potential to do greater damage, such as stealing banking or login credential.

 

If the botnet remains connected to computers, cybercriminals could send new malware to their systems that cause bigger problems.

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Massive Mac Trojan Attack Still Under Way

Massive Mac Trojan Attack Still Under Way | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Kaspersky Lab -- which is offering the free tool -- counted up to 670,000 infected OS X machines in the botnet last week; today has seen just 227,493 so far, up from 208,301 yesterday.

 

Over the weekend, Kaspersky saw a major dip in the number of active infected Macs, from a head count on Friday, April 6, of 650,748, to 248,723 on Saturday, and then 237,103 on Sunday.

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flashfake Removal Tool and online-checking site

Flashfake Removal Tool and online-checking site | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
After intercepting one of the domain names used by the Flashback/Flashfake Mac Trojan and setting up a special sinkhole server last Friday, we managed to gather stats on the scale and geographic distribution of the related botnet.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Java: The OSX and Cross-Platform Nightmare | threatpost

Java: The OSX and Cross-Platform Nightmare | threatpost | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
The Flashback botnet is an indication that Apple is not putting enough energy into security and that oracle isn't paying attention to Java security issues.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Has Flashback malware made you consider installing antivirus on your Mac?

Has Flashback malware made you consider installing antivirus on your Mac? | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Hello Mac users, welcome to the problems facing Windows users!

 

Now Mac users are facing a far more serious threat. Having your Mac as part of a botnet, and having malware on the system that’s sniffing passwords is a big deal indeed, and far scarier than some fake security popup. Flashback is serious malware. Unless you do some digging around on your system, you won’t even know it’s there.

 

That’s serious. But is it serious enough to get Mac users to protect their Macs?

 

I hope so, because ===> this incident has highlighted how wide open Mac users are to attacks, and it’s clear that Apple doesn’t have their backs covered. <===

 

more...
No comment yet.