Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Businesses OS X Operating Systems Apple

Mac Trojan Horse Disguised as Word 2004 785

Espectr0 writes "Macworld is alerting of a malware program for the Mac. A Macworld reader alerted the magazine to the malware after he downloaded the file from Limewire. The reader told Macworld: 'I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta. The file unzipped, and to my delight the Microsoft icon looked genuine and trustworthy.' However, he added: 'I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!'" This sounds similar to the recent trojan horse proof-of-concept. There are many ways to make one file look like another, on any platform. This is 2004, you should know by now not to open a file from an untrusted source.
This discussion has been archived. No new comments can be posted.

Mac Trojan Horse Disguised as Word 2004

Comments Filter:
  • by ericspinder ( 146776 ) on Wednesday May 12, 2004 @02:55PM (#9131155) Journal
    I downloaded the file [off Limewire] in the hope that perhaps Microsoft had released some sort of public beta...and to my delight the Microsoft icon looked genuine and trustworthy"
    We have got to come up with a name for "someone who makes a good effort at removing themselves from the Internet".
    • Already got one. Notice how "microsoft" came up, even in the story about the Trojan on a Mac?
    • Congrats, you've just invented the Spinder Awards!

      How do I nominate someone? And when are the awards given? :)
    • by rjamestaylor ( 117847 ) <rjamestaylor@gmail.com> on Wednesday May 12, 2004 @03:04PM (#9131316) Journal
      Why do you think they call it Apple Darwin, anyway?
    • by Gudlyf ( 544445 ) <.gudlyf. .at. .realistek.com.> on Wednesday May 12, 2004 @03:14PM (#9131518) Homepage Journal
      In case it's not obvious, from here [uh.edu]:

      "404: Someone who's clueless. From the World Wide Web message> "404, URL Not Found," meaning that the document you've tried to access can't be located. "Don't bother asking him...he's 404, man.""

      • by Anonymous Coward on Wednesday May 12, 2004 @03:44PM (#9131985)
        Going OT here, but here's the whole list of HTTPanties:

        100 Continue (she's accepting you)
        200 OK (go for it!)
        202 Accepted (see 200)
        300 Multiple Choices (pick a hole, any hole)
        400 Bad Request (explain what you mean)
        401 Unauthorized (she doesn't know you yet, but if she does, she'll let you)
        402 Payment Required (self-explanatory)
        403 Forbidden (I guess she's just not in that kind of mood)
        404 Not Found (she may be back)
        405 Method Not Allowed (guess the any hole part of 300 was wrong)
        406 Not Acceptable (she doesn't like you)
        408 Request Timeout (you were too slow - try again)
        409 Conflict (got some 3-way there?)
        410 Gone (damn, you got dumped)
        411 Length Required (she wants to know that first)
        413 Request Entity Too Large (stop buying penis pills)
        414 Request-URI Too Long (see 413)
        415 Unsupported Media Type (wait, this is a LESBIAN HTTP/1.1 error code thing?)
        416 Requested Range Not Satisfiable (she knows she's not good enough for you)
        417 Expectation Failed (self-explanatory)
        500 Internal Server Error (she should be checked out)
        501 Not Implemented (well, teach her!)
        503 Service Unavailable (wait a while, and watch)
      • I think... (Score:5, Funny)

        by Cyno01 ( 573917 ) <Cyno01@hotmail.com> on Wednesday May 12, 2004 @04:34PM (#9132602) Homepage
        That if i refered to someone as being "404", even my geekier friends would slap me. Almost as bad as the time i heard someone using the future slang from tom clancy's net force books...
    • If it sounds too good to be true, it probably is.

    • I'll bet he never does that again!

      One user educated... several millions to go!
      • by SquadBoy ( 167263 ) on Wednesday May 12, 2004 @03:45PM (#9132006) Homepage Journal
        This was a person who based a choice on whether or not to run an app based on how the ICON looked. They will repeat over and over and over again and wonder why the hell their shit keeps breaking.
        • by 0x0d0a ( 568518 ) on Wednesday May 12, 2004 @08:11PM (#9134747) Journal
          This was a person who based a choice on whether or not to run an app based on how the ICON looked. They will repeat over and over and over again and wonder why the hell their shit keeps breaking.

          And what methodology do you use to ensure that your software is safe, I have to ask? Really, there are no good generally-available methods of avoiding such trojans.

          I think I'm reasonably competent at determining whether something's a trojan, compared to most folks. I've been known to strings binaries, to disassemble and do raw code analysis, to use various debugging tools, and to run things chrooted. I generally stick with free open source software only. However, in all honesty, there are no real strong protection mechanisms available. It's not very difficult to produce a trojan that will get past these barriers.

          The problem is that people look at the statement "the icon looked legitimate" and think "hey, that isn't a good method to use to check the legitimacy of something" and immediately (and illogically) jump to "and I could do better".

          There's no real reason to ridicule the guy.
          • by cyril3 ( 522783 ) on Wednesday May 12, 2004 @09:19PM (#9135226)
            there are no good generally-available methods of avoiding such trojans.

            But even the bad ones are better than 'Gee, the Icon looks pretty. Virus writers are nortoriously bad artists so this program I downloaded from some unknown person that claims to be a secret beta of a Microsoft product should be fine to run'

            Hows this for a logical jump.

            Hey, that isn't a good method to use to check the legitimacy of something

            so

            I'll ring my aged grandmother and ask her should I run it and she'll say "Don't be stupid, running software like that you could catch one of those virus thingys that are running around these days" (She has a 50% chance of being right)

            and that would be better than looking at the freaking ICON.

    • by anonymous loser ( 58627 ) on Wednesday May 12, 2004 @04:34PM (#9132595)
      This man is luckier than he realizes. He might have actually installed a Microsoft product instead of a mere trojan horse!
  • by Suffering Bastard ( 194752 ) * on Wednesday May 12, 2004 @02:55PM (#9131161)

    I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta...I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!

    Maybe this is Microsoft's new security paradigm. No one can steal your data, not even you!

  • Think first (Score:5, Insightful)

    by BWJones ( 18351 ) * on Wednesday May 12, 2004 @02:55PM (#9131162) Homepage Journal
    The reader told Macworld: 'I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta.

    Using Limewire? A likely story.

    The file unzipped, and to my delight the Microsoft icon looked genuine and trustworthy.' However, he added: 'I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!'"

    This is the risk you take when downloading stuff that you don't pay for. If you purchased Office 2004 from Microsoft (thus supporting the promotion and development of software for OS X), then you would have something to gripe about. As it stands, one might suggest you got what you paid for.....

    This is 2004, you should know by now not to open a file from an untrusted source.

    Well said. However, this does raise the possibility of other code that could be made to look like just about anything. So, once again, think about what you install on your computer just like you would think about what you eat or who you have sex with. If you don't know, trust or suspect that software/food/person, then either screen them or think twice.

    • by lukewarmfusion ( 726141 ) on Wednesday May 12, 2004 @02:59PM (#9131222) Homepage Journal
      "So, once again, think about what you install on your computer just like you would think about what you eat or who you have sex with. If you don't know, trust or suspect that software/food/person, then either screen them or think twice."

      The Slashdot folks obviously think alot about what kinds of food they eat (everything) and who they have sex with (nobody).
    • by John_Sauter ( 595980 ) <John_Sauter@systemeyescomputerstore.com> on Wednesday May 12, 2004 @03:04PM (#9131314) Homepage
      So, once again, think about what you install on your computer just like you would think about what you eat or who you have sex with. If you don't know, trust or suspect that software/food/person, then either screen them or think twice.
      Hmmm. I detect a market for a software condom. That's a much better term than "sandbox" in some markets.
      John Sauter (J_Sauter@Empire.Net)
    • by somethinghollow ( 530478 ) on Wednesday May 12, 2004 @03:09PM (#9131424) Homepage Journal
      just like you would think about what you eat or who you have sex with

      Or who you eat and what you have sex with.
    • So, once again, think about what you install on your computer just like you would think about what you eat or who you have sex with.

      And make sure you have backups of anything worth keeping.

      Too bad you can't back up the other two... instruments. I must admit to seeing obviously-vile food items and wondering "What if...?"

      ...Then again, that doesn't hold true for the third example. Times like that I'm happy to have no reason.
    • by nomadic ( 141991 ) <nomadicworld@ g m a i l . com> on Wednesday May 12, 2004 @03:11PM (#9131472) Homepage
      Using Limewire? A likely story.

      Yes, that's probably the least credible statement I've ever seen on slashdot. Just so you understand the impact of this statement, I'll highlight the important words: that's probably the least credible thing I've ever seen on SLASHDOT.
  • Windows (Score:4, Funny)

    by dicepackage ( 526497 ) * <dicepackage@gmai[ ]om ['l.c' in gap]> on Wednesday May 12, 2004 @02:56PM (#9131165) Homepage
    This would never of happened if they were using a secure operating system like Windows.
    • Re:Windows (Score:3, Funny)

      by javatips ( 66293 )
      You're right... On Windows, the trojan would have been much more efficient... It would have wiped the entire hard drive!
    • Actually... (Score:5, Insightful)

      by rtilghman ( 736281 ) on Wednesday May 12, 2004 @03:04PM (#9131330)

      If it was a windows installed you could check to make sure that various files were signed and authenticated by MS, information which I don't believe can actually be faked (dlls, exe, cab files, etc.).

      I don't know if Mac has a similar feature, and I don't know if some random moron like this guy would even have bothered to check. However, it would seem that MS' own security would indeed have offered a better chance of preventing such a Trojan. :)

      -rt
    • Re:Windows (Score:5, Informative)

      by aristotle-dude ( 626586 ) on Wednesday May 12, 2004 @03:26PM (#9131728)
      I know this is meant to be a joke but this would happen on any platform with a stupid user at the helm. This is nothing like the proof of concept Trojan. It is a classic trojan (malware program claiming to be some useful program). Fortunately, the OSX security model prevented the damage from spreading outside of the home folder. An admin account (default on Home and Pro XP) would have the ability to totally destroy a system whereas Admin accounts on OS X are not root accounts.
  • beta (Score:5, Funny)

    by pizza_milkshake ( 580452 ) on Wednesday May 12, 2004 @02:56PM (#9131170)
    in the hope that perhaps Microsoft had released some sort of public beta...

    yeah.

  • by American AC in Paris ( 230456 ) * on Wednesday May 12, 2004 @02:57PM (#9131185) Homepage
    A Macworld reader alerted the magazine to the malware after he downloaded the file from Limewire. The reader told Macworld: 'I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta.

    Uh-huh.

    Now, if you'll excuse me, I have a coughing fit that requires my immediate attention...

    • by Forgotten ( 225254 ) on Wednesday May 12, 2004 @05:08PM (#9132999)
      My guess is that the person doesn't exist at all, and instead was created by someone from Intego. The correspondence Macworld received is fictional. This would be in keeping with Intego's manner of operation in the past. They didn't necessarily create the Trojan and inject it into Limewire, but they'd certainly want to make it known as quickly as possible.

      Like most companies selling security software for personal computers, they're basically in the business of marketing snake oil, and that means the creation of FUD. It's a new concept in the Mac world, but age-old for Windows.

      From the Intego site:

      Intego VirusBarrier X eradicates this Trojan horse, using its virus definitions dated May 11, 2004, and Intego remains diligent to ensure that VirusBarrier X will also eradicate any future viruses that may try to exploit this same technique.


      WTF is that supposed to mean? And what is "infection" in the context of a Trojan horse?
  • by SuperguyA1 ( 90398 ) on Wednesday May 12, 2004 @02:58PM (#9131202) Homepage
    Let's see... You downloaded a microsoft public beta from a p2p net without checking ms's website for any existance of the beta. Then just because the icon looked like a m$ icon you figured it was safe with no virus scan? If you purchase this BEAUTIFUL florida swampland I have I bet your files will be restored and word 2004 will work fine

    call me
  • by Eagle5596 ( 575899 ) <slashUser@5[ ].org ['596' in gap]> on Wednesday May 12, 2004 @02:59PM (#9131209)
    Because everyone knows the icon is the best way to ascertain the security and authenticity of any piece of software. It's very secure and hard to change, uh huh.
    • by Jesrad ( 716567 ) on Wednesday May 12, 2004 @03:13PM (#9131510) Journal
      Newsflash, the source code of the trojan has been obtained. It's thought to be something like this:
      ----------
      tell application "Finder"
      move home to trash
      empy trash
      end tell
      ----------
    • by WebCowboy ( 196209 ) on Wednesday May 12, 2004 @03:35PM (#9131844)
      Remember, a good deal of the Mac users out there are clueless ex-Windows user friends that we instructed to purchase Macs after scrubbing their old PCs of viruses, adware, spyware and other such crap one too many times.

      No matter how often we tell them otherwise, it is ingrained in them to use the icon as an indictor of a file's content. If it wasn't then a great deal fewer email viruses would make it into the wild.
  • by sith ( 15384 ) on Wednesday May 12, 2004 @02:59PM (#9131216)
    The earlier article dealt with a document file showing the wrong file type because of extension VS resource fork issues.

    This is just a case of assigning a different icon to an application. Could be as simple as an rm -rf / shell script with a word icon.
  • Why Not? (Score:3, Insightful)

    by tarballedtux ( 770160 ) on Wednesday May 12, 2004 @02:59PM (#9131224)
    Every OS is vulernable to the ultimate virus: Stupidity.Virus.a Only one release was needed.
  • by davidu ( 18 ) on Wednesday May 12, 2004 @03:00PM (#9131227) Homepage Journal

    This should be filed under the "Humans" topic as this has nothing to do with apple or even computers.

    Trojan Horses are social problems -- there isn't much apple or microsoft or anyone can do other than try to keep people on their toes.

    I mean come on, limewire?

    davidu
    • by kuwan ( 443684 )
      This has nothing to do with the Mac platform or the security of that platform. If I can convince you to run a malicious program, on any platform, then I can do pretty much whatever I want to your system.

      This exact same problem exists for Linux, Windows, Solaris, and *BSD. Unfortunately people will probably take this example to mean that the Mac OS X platform is somehow insecure because of it. I could do the exact same thing for Windows and if you would download it from LimeWire (or any other untrusted s
  • by MacWannabe ( 756042 ) on Wednesday May 12, 2004 @03:00PM (#9131229) Homepage
    Seriously, what a tard. The only things you can trust off Limewire is the quality porn!
    • Here is how the article should have read.

      I downloaded this Phat slice of porn in the hope that perhaps Microsoft had released some sort of public beta porn. Well dude, I unzipped, and to my delight the Microsoft icon looked genuine and trustworthy...I clicked on the installer file, and to my horror 10 seconds later the attachment had wiped my entire Porn folder...now I need to figure out how to clean off this friggin' keyboard...
  • by LostCluster ( 625375 ) * on Wednesday May 12, 2004 @03:00PM (#9131236)
    'I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta'

    That's a likely story...

    Come on people. The only trustworthy source of any public beta software from Microsoft would be a website in the form of "http://*.microsoft.com/*" and there'd likely still be pretenders claiming to be that package floating on Limewire. Don't trust that it's Microsoft software unless you've seen Microsoft make an say that the distributor is legit.
  • by juuri ( 7678 ) on Wednesday May 12, 2004 @03:00PM (#9131238) Homepage
    Instead of deleting a person's files (I know you 0wn3r3d th3m!@#!) how about you do the rest of us a favour.

    From this point on all trojans, such as this one, who invite idiots to test the lows of their computer skills should, instead of removing random files, disable a person's net connection. Think about the good you would suddenly be doing for the online world! You can make a positive difference! Your life isn't lost yet! Go you!
    • disable a person's net connection

      Didn't blaster do something like this? It was an attempt at making the Windows morons not be able to go online...

      Now all we need are the mac morons offline and, the net is ours again!

      Yippie.

  • by Jesrad ( 716567 ) on Wednesday May 12, 2004 @03:01PM (#9131241) Journal
    I mean, a 60 Kilobytes Applescript fits perfectly the name "Word 2004 Mac Beta Installer".

    D'uh.
  • by rthille ( 8526 ) <web-slashdotNO@SPAMrangat.org> on Wednesday May 12, 2004 @03:01PM (#9131253) Homepage Journal

    This is a perfect use for Fast User Switching. Create an account with no perms and no data you care about losing. Test downloads in that account. You can do it without even logging out.

    Be careful though of the fact that there's no restriction on network access for a 'no perms' account. (This is a failing of UNIX in general, not MacOS in particular.) This would allow Microsoft/anyone to put out a trojan like this, and send back a 'this IP fell for it' packet, or even run a server on a 'high' port (depending on your firewall configuration).
    • by Bullet-Dodger ( 630107 ) on Wednesday May 12, 2004 @03:13PM (#9131504)
      Little Snitch [obdev.at] is good for preventing anything from phoning home. Does have slightly annoying behavior unless it's registered, however. Anyone know of an OSS program to do this?
    • by ducomputergeek ( 595742 ) on Wednesday May 12, 2004 @03:15PM (#9131549)
      Here is a better idea: don't try beating the system. 90%+ of all computer problems are really not lack of secure code, its the idiot sitting in front of the screen. While getting Office and other programs from p2p may be trendy and even "cool" to some, you run the risk that it might not be as advertised.

      Out in the professional world we do pay for everything. Why? In the last 6 months, two graphics designers in this town were busted for using warezed versions of Photoshop and black listed by other companies in the area including long time clients. And advertising/marketing being cut-throat as it is, there were glaring stories about it in the local business journal. Wow, probably $100k+ income lost to save $5k on software. Smart move there!

      If there was such a thing, then download from a MS website or trusted mirror (like download.com) or else roll the dice and take your chances.

      Personally I am waiting for the $10 for shipping beta from MS as I am classified as an "IT manager/decision maker" for our company (and several others as I also do consulting).

  • Hmm (Score:3, Insightful)

    by Bullet-Dodger ( 630107 ) on Wednesday May 12, 2004 @03:02PM (#9131273)
    This sounds similar to the recent trojan horse proof-of-concept.

    Not really, no. The point of that was that it was a application that looked like an mp3. This is just a application with a misleading name/icon. Anyone write code that erases a users home folder and call it Microsoft Word.

    • Re:Hmm (Score:3, Funny)

      by CrowScape ( 659629 )
      But what's really impressive here is that they were able to spell Microsoft without the "$". No wonder he was fooled!
  • by Alcimedes ( 398213 ) on Wednesday May 12, 2004 @03:03PM (#9131301)
    He doesn't mention this in the article, but I was wondering if this asked him for a password before it executed.

    I would assume it would have to before it runs an rf command on his home directory.

    If it didn't ask for one, that's not good. If it did and he entered it in, he's a complete moron. Although the reality is, any OS will always be vunerable to user stupidity. It's the worms etc., that are a serious problem.

    • No it doesn't only if the program would want to do something that requires root privliges.

      ANY user can execute an rm -rf / it would just fail on all the files the Unix user does not have permissions on.

      M.
  • by Conesus ( 148179 ) on Wednesday May 12, 2004 @03:04PM (#9131315) Homepage
    Sure, that file came from an untrusted source. In fact, doesn't it serve them right to get bitten by illegally downloading software? Software that should cost money, and in fact does (quite a bit).

    But forget that fact that this happened on an unethical download. The fact that this is malware, not a virus or a worm, not something that is exploiting the operating system by opening known bugs or attempting to hack into key parts of the system which normally would require keychain access, but that this is merely software that the user chose to install, and chose to authenticate (maybe? did it require keychain access to be able to delete files from the home directory? I think Apple probably allowed that to happen since programs *do* need to be able to write files to the Home directory, just not anywhere else, save for a temporary folder like /tmp).

    Just keep in mind that while the program itself was not ethical, nor were the actions of the user by downloading non-free software, this should come as no surprise to the user or to Apple, since this is not a compromise of the system nor something Apple can prevent, except through education (Don't open untrusted files and programs).

    Do you think this would have happened if the user was downloading legit sourceforge or another self-produced program that claimed to do something else and just became malware or a random pop-up creator? Would we cry foul if the program was *not* downloaded illegally?
  • by Homology ( 639438 ) on Wednesday May 12, 2004 @03:05PM (#9131340)
    'I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!'"

    A similar program om Windows could do far more than just hose someones Home folder, because most Windows users runs with high privileges.

    • by HeghmoH ( 13204 ) on Wednesday May 12, 2004 @03:43PM (#9131973) Homepage Journal
      Yes, but the home folder is all that matters. The way UNIX protects system files is very nice, but the reality is that for most users, the stuff in /home or /Users or /users or whatever your flavor of UNIX uses is what counts. If you trashed my entire computer but left /Users alone, I'd be annoyed and reinstall. If you trashed /Users, I'd be annoyed and restore from backup... but most people don't keep anything resembling decent backups. Especially on a Mac, where it takes twenty minutes to reinstall the OS, the difference between trashing /Users or trashing the entire system is miniscule. Of course, if it's a multi-user Mac, a trojan can only trash the current user's files.
  • by Anixamander ( 448308 ) on Wednesday May 12, 2004 @03:05PM (#9131346) Journal
    This sounds similar to the recent trojan horse proof-of-concept

    This is nothing of the sort. The recent warning was for mp3 or other non-executable looking files carrying a trojan horse payload...that is far sneakier than this. This is simply a program that doesn't do what it claims to do. He expected an executable, he got an executable. An if he really thought that Microsoft would relase a public beta through limewire...well, caveat emptor and all.

    Since it only deleted his home directory, it probably wasn't that sophisticated. I'm surprised it didn't attempt to escalate privilieges under the guise of an installer and do even more damage.

    I suppose I should make a clippy joke here (I'm really tempted), but I actually like office X and am looking forward to the next version.
  • by Isbiten ( 597220 ) <isbiten@gmail.cCHICAGOom minus city> on Wednesday May 12, 2004 @03:07PM (#9131381) Homepage
    Evily stolen from robg Link [macosxhints.com]

    After reading the article and the press release, I think it's pretty obvious what the program is doing -- I suspect it's nothing more than a one-line AppleScript. Although some (perhaps many) will disagree with me, I'm going to publish what I think the exploit to be, because it's not a huge secret. Basically, my guess is that the trojan horse is a one-line AppleScript that contains the following UNIX command (in the script, the command will be accessed via the AppleScript method for calling a shell command, but I'm not going to bother including that part here):

    rm -rf ~

    WARNING!! DO NOT USE THIS COMMAND! YOU WILL ERASE YOUR USER'S DIRECTORY!

    I feel it's important that everyone understand the above command, and know what it looks like -- the more people who know what this line does and how it works, hopefully the fewer who will be fooled by it. And to claim that this is some "deep dark secret" that needs to be hidden is, in my opinion, trying to hide from the truth -- more "security by obscurity," which we all know doesn't work well at all. rm -rf is a very standard, very useful Unix command. In fact, if you search macosxhints (using the advanced search page) for the 'exact phrase' rm -rf, you'll get fully three pages of matches.

    What makes it troublesome in this case is simply that it's called from a program where the typical user will not know what's happening, and will be shocked at the outcome. But listing the command is not like explaining how to write a self-replicating virus that spreads from machine to machine -- this is common knowledge to probably at least a couple of million OS X users who have some knowledge of Unix.

    For those that don't know Unix, rm is "move to and empty trash," -r is "do this for all items and folders within this folder," the f means "force removal without confirmation," and the ~ means "the user's directory." Spelled out, this means that the script will, without warning or user intervention, delete everything in the user's folder. Permanently.

    The Intego press release explains one way to test a program if you suspect it might be a trojan horse -- select it, do a Get Info, and try to delete the icon. Here's another safety check that I often use myself: drag and drop the program onto Script Editor (or control-click on a package and select Show Package Contents to explore the package contents if it's a package installer). If you're lucky, and the script writer was somewhat lazy (by not making the script uneditable), the script itself will open for editing.

    So now that you know about this trojan horse, the question is, what should be done about them on OS X? My first thought on reading the article was "Cool, Darwin at work on the peer to peer networks!" But then, I considered some additional scenarios which may have more applicability in the real world. The current example is likely to remain on Gnutella, given that it's a program that purports to install the currently 'hot' application, the new Office suite. However, think about this version: A useful AppleScript that does something cool (change type/creator codes, backs up your directory, etc.). However, buried in the code is a timer that counts the number of times you've used the program. On the 50th run, it deletes your entire user's folder. Or worse, it pops up a dialog that says "In order to backup the Foo_bar file, we need your admin password." It may then be possible (I'm not quite sure how) for the app to delete the entire hard drive, instead of just your user's folder. If the script were useful enough, it could be very widely distributed, and then go blam! at some non-specified time in the future.

    What, if anything, should Apple do about this? Note that this is not specific to OS X; it's really a 'social engineering' exploit. I think it would be just as easy to write a similar 'exploit' for Linux or even Windows, given that it's a simple script that relies
    • rm is "move to and empty trash,"

      So..the average mac user wouldn't understand 'rm is 'remove' or 'delete'?

    • by Anonymous Coward
      There's nothing Apple can or should do. Aliasing 'rm' to 'rm -i' in your shell will only work if the person who writes the virus is kind enough to run your shell and let it load your aliases. They could write the commands in Applescript rather than using rm. They could write a C program to do it. This is all moot.

      If you have the power to delete all of your own files, then any program you run has that power too. Nothing can change that. Trojan horses are nothing new, and nothing surprising. They are a probl
  • by daveschroeder ( 516195 ) * on Wednesday May 12, 2004 @03:08PM (#9131399)
    From the read me:

    Trojan Example Read Me

    This is an EXAMPLE of an AppleScript with a custom icon. It does nothing malicious. It does not spread. It does not delete files. It speaks and displays some dialog boxes. It's merely poking fun at Intego's sensationalist handling of these issues on Mac OS X, and their claims that these represent serious flaws in Mac OS X.

    I wonder if Intego will protect against, and describe, this trojan...?

    Perhaps they can make another press release hawking VirusBarrier.

    For more information:

    das@doit.wisc.edu


    Available at:

    http://mirror.services.wisc.edu/mirrors/tmp/ [wisc.edu]

    The "trojan" is an AppleScript that speaks the text: "Muhahahaha. You have been owned by this elite trojan. Just kidding." It then displays a series of dialog boxes:

    1. "OMG! it's another trojan for Mac OS X! Will Intego have to protect against this one too?"

    2. "Intego's irresponsible sensationalism about non-issues is quite astounding."

    3. "They make wild claims about 'serious weaknesses' in Mac OS X that simply aren't true, for the sake of hawking their product."

    4. "AppleScripts and fake MP3s do not, nor will they ever, rise to the level of the mind-boggling number of completely remote exploits for Windows, requiring absolutely no user interaction, that plague millions of computers and cost billions of dollars of lost productivity."

    5. "Mac OS X is intrinsically and fundamentally more secure, and more open to peer and community review."

    6. "Social engineering problems, such as tricking a user into launching a fake Word installer that's really an AppleScript downloaded from a P2P network, don't reveal 'serious weaknesses' in Mac OS X."

    7. "Intego would be well suited to selling snake oil at a two-bit carnival."

    It then quits.

    It has Intego's VirusBarrier X installer icon, and is named "VirusBarrier X Install.app".

    (Note: this package is CLEARLY labeled as an example, and comes with a read me.)
  • by heyitsme ( 472683 ) on Wednesday May 12, 2004 @03:10PM (#9131444) Homepage
    1) Create shell script with "rm -rf $home/*"
    2) Package script with Microsoft Icon
    3) Upload to P2P network
    4) ???
    5) Laugh as retarded Slashdot editors call it valid malware

    Come on guys... lets get serious.
  • "This being 2004..." (Score:4, Interesting)

    by ChiralSoftware ( 743411 ) <info@chiralsoftware.net> on Wednesday May 12, 2004 @03:11PM (#9131462) Homepage
    "This being 2004, you should know not to open a file from an untrusted source." WRONG! This is exactly the mindset that has resulted in the security problems that plague computers today. Operating environments should have the ability to fully contain and isolate any process. Operating environments should have the ability to run hostile code with complete safety. The smart thing to do is to start regarding ALL code as hostile. One side effect of that is that failures of non-hostile code will be contained, too, making for a more reliable system.

    How can such a goal be attained? There are many ways available now. The most obvious one is a VM system with security policies, such as the JVM. That's not the only one, though. Another method is a capabilities [eros-os.org]-based system, so when a process starts, it has only a defined set of capabilities to work with. OpenBSD [openbsd.org] has a similar, but more limited system called systrace. The TrustedBSD [trustedbsd.org] project and SELinux [nsa.gov] have similar aims, and SELinux is being integrated into mainstream Linux distros. Another way to run untrusted things is with user-mode Linux [sourceforge.net], which I believe is integrated with Linux 2.6

    The editor is right, though, that on currently-used systems like OSX and MS Windows, you have to be careful what you click on. But the problem is that we have come to accept that as "the way things are", when there is no reason for that to be the case. You should be able to run hostile code, see what it does, laugh at it, and delete it without any harm. The technology to do that exists, and has existed for years, but we have come to accept broken products and systems that don't allow that.

    ---------
    WAP news [chiralsoftware.net]

  • by foidulus ( 743482 ) * on Wednesday May 12, 2004 @03:12PM (#9131491)
    You have to wonder, word is a pretty hefty piece of software, did the attackers even bother padding the program? A really quick download time would be one of a multitude of clues that what you are downloading probably isn't legit.
  • by Vrallis ( 33290 ) on Wednesday May 12, 2004 @03:14PM (#9131534) Homepage

    This is 2004, you should know by now not to open a file from an untrusted source.

    This is 2004, you should know by now that Microsoft can't possibly have released Office 2004 this year.

  • Word 2004 (Score:4, Funny)

    by Pac ( 9516 ) <paulo...candido@@@gmail...com> on Wednesday May 12, 2004 @03:17PM (#9131580)
    Had Microsoft released it, wouldn't it be a trojan horse anyway? It will slow down your computer, transmit personal data to Microsoft and, if past versions history serves as comparison, open your computer wide to all sorts of attacks. Thinking of it, perhaps the version he downloaded is an alpha including only the "slow down, transmit and open" subsystems.
  • Comment removed (Score:3, Insightful)

    by account_deleted ( 4530225 ) on Wednesday May 12, 2004 @03:18PM (#9131593)
    Comment removed based on user account deletion
  • by Mustang Matt ( 133426 ) on Wednesday May 12, 2004 @03:20PM (#9131633)
    What better way to get the "security problem" media focus off yourself than by exploiting a competitor.
  • by bw5353 ( 775333 ) on Wednesday May 12, 2004 @03:21PM (#9131640) Homepage
    There seems to have been one really silly user who fell for about the oldest trick in the book - calling a bad executable something nice. Why do Macworld even bother reporting it?

    It is a non story even if it happened, and it is unlikely to have happened. Unless the guy is a 10-year old who fell for a trap his 11-year old sister set up for him.

  • by jridley ( 9305 ) on Wednesday May 12, 2004 @03:25PM (#9131706)
    Now that at least some Windows users are starting to become aware of this sort of thing, are Mac users next?
    Most Mac users I talk to do nothing but go on about how they never have to worry about this sort of thing. Seems like a group of users that's that overconfident in their systems are ripe for infection.
  • Social engineering (Score:3, Interesting)

    by amichalo ( 132545 ) on Wednesday May 12, 2004 @03:32PM (#9131800)
    So this trojan was from 'Word 2004'..a decent one to pick because it recently started shipping.

    What other apps are good targets for trojan horses? I have always been afraid of downloading a 'virus scanner' because it just screams 'I have no virus scanner on my computer!'

    Others you have noticed? Perhaps a 'digital wallet' application to keep credit cards, passwords, etc. in :)
  • by CODiNE ( 27417 ) on Wednesday May 12, 2004 @03:32PM (#9131809) Homepage
    I just made a new user to run an rm -rf ~ on to see how it looks.

    I have to say I'm impressed with how Apple handles this situation. You actually have to do rm -rf ~/* but anyways, once your home directory is emptying there is no error message. No flood of missing files or application crashes. You just log out and log back in and hey you have the default's loaded again like a fresh user. Being a Windows/Linux switcher I have to say this is handled quite differently than I expected. At least in windows losing all your windows files is gonna cause some serious problems, may not be able to log back in again.

    Maybe I'm odd but eh. :)

    -Don.
  • by LionMage ( 318500 ) on Wednesday May 12, 2004 @03:38PM (#9131892) Homepage
    I took the MacCentral website (which is now run by Macworld) to task for this, and I'll take Slashdot to task for the same thing. In some of the more reputable Mac-related news sites, this story was more accurately covered; the Trojan in question was downloaded from the Gnutella network. Limewire is not a network, it's a Gnutella client -- yet sites like MacCentral reported that the file was downloaded from the LimeWire network. Now on Slashdot, we're seeing much the same thing -- as if to imply that this Trojan is somehow only available with Limewire.

    Since there are at least 3 other Gnutella clients available for Mac OS X (Phex, Acquisition, and XFactor are the ones I know of), there are many more potential vectors for this Trojan to find its way onto a Mac user's computer.

    Yeah, I know, it's asinine to trade warez on any P2P network...

    There's nothing to stop this Trojan from making it to other file sharing networks, except perhaps a dose of common sense, so this isn't even a Gnutella-specific problem. I'm just a little peeved with sloppy news reporting.
  • by inkswamp ( 233692 ) on Wednesday May 12, 2004 @03:40PM (#9131914)
    Intego is really starting to get on my nerves with this, and their previous, alerts. You could do this little stunt way back in OS 9. Cutting and pasting icons is easy.

    Strange that Microsoft has popped up in this one, huh? Hmm... if I were a conspiracy theorist....

    The real issues is whether it can it replicate itself and whether it can use security holes in OS X to distribute itself to others. I've been round and round with people on this topic and the conclusion is that, at every point, OS X presents too great a hurdle to allow it to occur. You either have to rely on lots of Apple programs working together to do it (which is too unwieldy and too visible to the user) or you have to rely on the more stealthy Unix stuff, much of which is turned off by default (i.e., no using mail quietly in the background to distribute the trojan/virus because sendmail is off by default.)

    It seems to me that Intego is looking to scare people into buying their products and in doing so, they have blown any credibility they have.

  • by Nom du Keyboard ( 633989 ) on Wednesday May 12, 2004 @03:40PM (#9131919)
    The files are not gone. MSWord 2004 is just converting them all to its native format. Even on a G5 however this will take another 6 days, so simply remain calm and trust to Microsoft.
  • trojans (Score:4, Informative)

    by tgibbs ( 83782 ) on Wednesday May 12, 2004 @04:05PM (#9132289)
    This sounds similar to the recent trojan horse proof-of-concept.

    No, that involved an application pretending to be a document. This is a case of an application pretending to be a different application. There is no security regarding the identity of applications, and an application can have any icon it chooses--the burden is on users to obtain their applications from trusted sources, not Limewire. Of course, if he really thought it was a "public beta," as he claims, he probably would have gone looking for it at the Microsoft web site.
  • Aha! (Score:5, Funny)

    by karnifex ( 724937 ) on Wednesday May 12, 2004 @04:14PM (#9132387) Homepage
    to my delight the Microsoft icon looked genuine and trustworthy

    This is where everything started to go wrong.

  • by soft_guy ( 534437 ) on Wednesday May 12, 2004 @04:36PM (#9132620)
    I think it would be a good idea to have a feature in OS X that could launch a program as "untrusted". It should be able to restrict the programs access to the file system, the network stack, etc. Kind of like what .Net does, except not as extreme.
  • by Warlock48 ( 132391 ) on Wednesday May 12, 2004 @04:48PM (#9132730) Homepage
    1- Some guy made a bad joke
    2- A Mac zealot did it coz' he doesn't like Microsoft stuff running on Macs
    3- Microsoft did it to teach pirates a lesson
    4- A Linux zealot did it to discredit Microsoft
    5- A BSD zealot did it to discredit Linux
    6- SCO did it because they own the IP of all Unix-based systems, so there
    7- Kevin Bacon did it

    ... Obviously, any of the above was controlled by NSA's orbital mind-controlling ''lasers''.

  • by Agile Monkey ( 772569 ) on Wednesday May 12, 2004 @05:10PM (#9133022)
    Ok, let's see here. He's poking around on limeware looking to get some free software. I'll call it piracy, you can call it "unauthorized downloading of a copyrighted work".

    So anyway, this guy downloaded something, and *GASP* his ignorance of what software is out there made him get something he didn't want.

    This might be kind of funny if its a friend of yours, but seriously folks, is this really front page material for slashdot? I love this site, I truly do, but please editors at least have some standards for what gets on the front page.

  • by SQLz ( 564901 ) on Wednesday May 12, 2004 @05:10PM (#9133024) Homepage Journal
    The file unzipped, and to my delight the Microsoft icon looked genuine and trustworthy.

    Its all about the icon baby, all about the icon. As long as that *looks* legit, you know the warez are genuine. bahahaha.

  • by theolein ( 316044 ) on Wednesday May 12, 2004 @05:23PM (#9133198) Journal
    Q&A from Intego regarding Trojan Horse

    Where did Intego first find out about this Trojan horse?
    Intego, after writing and releasing the first mp3 trojan for the Mac OSX platform in order to improve our business, decided to write a dangerous Applescript, give it an installer icon and release it in order to further generate sales for our otherwise uselss AV products that no one wants. Even though this is not a real trojan and this approach involves social engineering that has been known about for years (We initially considered simply writing a readme file that instructed the user to type "rm -rf ~/" in the terminal, but thought that that would be too complex) we know thta our approach, known as the SCO school of IT business, is guaranteed to raise revenue.

    Have you informed Apple, Microsoft and the CERT about this Trojan horse?
    Yes, we informed Apple, Microsoft and the CERT as soon as had done our first working Applescript. They were very proud of us. Especially the people at Microsoft.

    Has Microsoft made any comments about this Trojan horse?
    Microsoft made the following comments: "Microsoft has verified that it does not write or encourage others to write trojans for the Macintosh platform. Microsoft, however, certainly is not above offering the occasional tip when it comes to torpedoing other company's platforms"
  • by bfg9000 ( 726447 ) on Wednesday May 12, 2004 @05:46PM (#9133492) Homepage Journal
    'I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!'

    Whaaaat? TEN FRICKIN' SECONDS!!! Dude, you need to upgrade. My G5 smoked my home directory in TWO.
  • Newsflash! (Score:4, Insightful)

    by mabu ( 178417 ) on Wednesday May 12, 2004 @05:53PM (#9133585)
    Mac user pirates a 10kB OSX version of Word and gets all his stuff deleted.

    Don't you think Slashdot is the last place where people need to be made aware of something like this?

    Turning your boneheaded mistake into a security advisory isn't going to win you much respect here.

"jackpot: you may have an unneccessary change record" -- message from "diff"

Working...