Demo Virus For Mac OS X Released 268
Juha-Matti Laurio writes "Heise Security has a report about new Proof of Concept virus for Mac entitled as OSX.Macarena by AV vendor Symantec. Symantec suffered from a slight lapse when it recommended in the first version of the virus description that users clean the system by deactivating the system restoration (Windows ME/XP). It is known that the virus infects other data in the folder in which it is started, regardless of extension, says Heise."
This is on the front page of slashdot why? (Score:5, Insightful)
Wow. Um. Raise the alarm. One if by land, two of by sea, and all that.
Oh, and here's my new piece of nasty Mac OS X malware:
Place this in a text file and name it ElectricSlide.command:
rm -rf ~/*
Double click it. Voilà. A piece of malware that can't actually spread that deletes the contents of your home directory with no warning!
Maybe we can see a Symantec warning about OSX.ElectricSlide!
I realize Symantec or any AV vendor has to catalog known malware, but come on: the coverage this is getting is ridiculous, and now the front page of slashdot?
Mac OS X certainly has vulnerabilities. The people saying it doesn't are morons. But the problem is that any vulnerability discovered in any Apple product gets amplified in the press massively disproportionately. For example, the iPod Windows virus issue:
By all accounts, there was likely a Windows PC used for QA at a non-Apple contractor that was infected with a virus that was infecting iPods with the virus when they were plugged in to that machine. (If anything, this is a problem in the QA process at Apple's manufacturing contractors, not ANY indication that "Macs" or Apple are any more susceptible to viruses or attacks, in any way, shape, or form - I'm surprised at the level of shoddy journalism on this. This is a Windows worm copying itself to a locally attached Windows disk (that happens to be an iPod), nothing more. Yes, it's really bad for any manufacturer to ship something with a virus on it, but this doesn't indicate the susceptibility of Apple or Macs in general. If anything, it indicates the iPod is effective as a USB-attached disk. Which it is. Again, no excuse for the processes to let something like this happen, but still.)
Then, the coverage of this goes on to rehash the (incorrect) assumption that someday there will be a huge worm outbreak on Macs, an assertion that is completely unrelated to iPods being infected with a Windows (or even Mac) virus.
I'm not going to rehash why it's literally impossible for the type of devastating mass-propagating worms that we've seen on Windows happen on Macs; marketshare/presense alone is enough to make that argument, but marketshare is only one of many factors.
I predict that we'll continue seeing these sky-is-falling and "WAKEUP CALL FOR APPLE" articles month after month and year after year, with nothing actually happening of any consequence to the installed Mac OS X base. Will there be new viruses, worms, malware, and proofs of concept of malicious items for Mac OS X? Yep. Absolutely. Just as there have been. Will there be something that can mass-propagate to the point where it costs the tens/hundreds of billions of dollars and hundreds of thousands of manhours in recovery and lost productivity like we do on Windows? Nope. The architectural, use, marketshare, and security differences on the Apple platform versus Windows ensures that.
The coverage of this will likely be further classic examples of press jumping on any negative or security-related story that has to do with Apple.
Maybe this will even be the sixth or seventh, by my count, "FIRST MAC OS X VIRUS" story that can be trumpeted around on CNN, AP, and Reuters! One can only hope!
Also, before anyone says "There's also a Bluetooth 0day [sans.org] for OS X," that would actually be the same, months-old, single Bluetooth issue that has already been reported on months ago, and that was patched in all versions of Mac OS X for a year even at the time that the worm,
Re: (Score:3, Funny)
Re: (Score:3, Informative)
Re: (Score:2)
Trojans will still be trojans and users will still be able to tricked into doing Bad Things.
Hopefully, even that will be mitigated to some degree by 10.5's MAC and application signing technologies. I'm not counting on it, but at least for power users it will let us run untrusted code safely and if Apple pulls a rabbit out of their hat, it could conceivably do the same for even novice users making trojans a really hard social engineering challenge.
Re:This is on the front page of slashdot why? (Score:5, Funny)
Three if by tubes?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It's a rare thing, unfortunately, to see a counterpoint so well executed as yours but you nailed every point. Well done, sir.
Re: (Score:2)
The truth of this argument is, as inherently insecure as Windows may be, the argument shouldn't be about vulnerabilities. It should be about time from vulnerability acknowledgment until correction. That being said, Mac didn't take this stance. They took the "we don't get viruses" high road. I'
Re: (Score:2)
The first is what matters to me directly regarding the security of my OS. The second is what effect that OS has on the network.
Re: (Score:2)
A new Windows virus that can actually do some damage? News item. OS X proof-of-concept-lame-trojan? Hullabaloo. Hopefully that will keep up. When we get to the point where non-issues aren't mentioned and major ones are routine it will be time to go in search of a new OS.
Learn to read (Score:4, Insightful)
In fact, my own little "rm -rf ~/*" joke doesn't require any privilege escalation at all and can delete the contents of your home directory with no further warning. Something as simple as that can be bundled up with Platypus by anyone who can click a mouse as a little trojan that looks like any other Mac OS X application.
Think that's "stupid"? It's just as stupid as this "virus" proof-of-concept that does nothing more than show that it can be appended to a file. It doesn't spread, and has no vector for propagation. Before you say "well, all someone has to do is find a vector!"
Um, yeah. That's the hard part, "nitwit".
Re:Learn to read (Score:5, Funny)
Yeah sure (Score:2)
Re: (Score:2)
"sudo chmod *.* 000"
Re: (Score:2)
Re: (Score:2)
No vector for automatic propagation, perhaps. I'm old enough to remember viruses back in the days before the Internet and email, though, when they were spread via infected floppies. Hell, just the other week there were stories here about a McDonalds flash-based mp3 player that shipped with a virus, and another about an infected batch of iPods.
No vector for pr
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
When are you nitwits going to get it through your head that there's no such word as "virii" [linuxmafia.com]?
Re: (Score:3, Interesting)
Sure there is. It's a jargon word to refer to more than one computer virus (note: not more than one biological virus.)
And yes, it's incorrect Latin, but the word "television" was created by incorrectly mashing a Latin word together with a Greek word. Nobody cares that it's not a "real" word. Usage makes it real. That's English for you.
Re: (Score:3, Informative)
2. "Page count increasing"? Huh? Nothing in that post links to any site that has anything to do with me.
Re: (Score:3, Interesting)
Rambing? It was an example of how something utterly technically unrelated is used as an excuse to push Apple into the security spotlight again, claiming that because a QA machine infected with a *Windows* virus at one of its contractors means "Apple" is being targeted more by "hackers". (???)
Your turn, please describe, specifically, why you felt compelled to post such an enormous amount of text in the first place?
For accuracy and a comprehensive analysis of the situation,
Re: (Score:2)
No. Mac OS X hasn't had any cherry popped.
This isn't the "first" proof-of-concept for OS X that meets the definition of a "virus". There have been previous examples of malware that has specifically inserted code into other things on the filesystem (the hallmark of a "virus").
What I want to know is, when will we stop hearing about each and every new piece of malware for Mac OS X when they're not even novel, new, or interesting anymore?
Re: (Score:2)
Re: (Score:2)
You seem to miss the point. Feel free to post a story about a Mac virus when they start doing something like this:
Or even if one spreads beyone a few computers...
Re: (Score:2)
Re: (Score:2)
I'll make you a deal - I'll stop being interested in them when you stop feeling compelled to tell me they aren't of interest.
Re: (Score:2)
Witty, but how exactly is this interesting?
The point wasn't, "This isn't a virus," it's, "Why is this on the front page of slashdot?"
This isn't like someone trying to say "nothing to see here, move along" to cover up a story; rather, there really is nothing here. Sure, it's a "virus", technically, with no means of propagation that doesn't do anything particularly new or interesting in
Re: (Score:2)
P.S. I don't find your long-winded posts interesting either, but I'm not demanding an explanation from you why you post them, or an explanation of how they are interesting.
P.P.S. Articles posted to the front page of Slashdot are sometimes A)Inaccurate and B)Not Interesting
Re: (Score:2)
This doesn't even meet the definition of a virus at all. A virus has to not only attach itself to some other file, but also to spread. As you said in another post, there is no vector with which this thing can spread (aside from direct user intervention).
At best, this is proof of concept for a very primitive trojan: please download me, make me executable, then execute me. Pretty please? I'll do great things for you, I
Re:This is on the front page of slashdot why? (Score:4, Informative)
Viruses take advantage of weak spots in other executable code. Macro viruses exploit a word processor's macro system. Boot sector viruses exploit the computer's boot loader. In every case, though, the virus takes advantage of some piece of already-existing piece of software that executes code automatically, usually without direct control or knowledge from the user.
A worm OTOH, is its own executable. It's essentially a self-replicating daemon. It does exploit weaknesses in a system's remote-execution code to propagate, but it doesn't require an interpreter. All it has to do is write its executable text to a block of memory, then trigger a fault which causes that block of memory to be treated as an executable.
Automatic propagation is the hallmark of a worm or virus, though. If Macarena can propagate every time someone opens an infected file, it's a virus. If you have to run a specific infection program to attach the payload to other files, it's not a virus, it's just a program that appends unwanted crap to other files.
Re: (Score:2)
I'd love a pointer. I spent some time actively looking, and didn't have any luck.
when will we stop hearing about each and every new piece of malware for Mac OS X when they're not even novel, new, or interesting anymore?
When they are not novel, new, or interesting anymore. Sadly, that will be where there is actually a real problem.
Re: (Score:2)
Re: (Score:2)
And cat doesn't prepend/append itself to everything in the directory when you run it.
I initially misread this as "A cat doesn't prepend..." and thought I was about the read the best analogy ever. Alas.
A virus should also perform some function the user does not intend or know about.
A malicious virus certainly should, but this was a proof of concept, so I'm not sure that is an issue.
Re: (Score:2)
Worms are similar to viruses but they spread themselves. Viruses require the user to spread something, like a disc or file, but then they take care of the infection. Trojans, on the other hand, don't propagate -- the original program must be run for each infection.
Re: (Score:2)
Yup, that would be the definition of "computer virus".'
Actually, I think that's technically known as a worm. Viruses, in turn, are a damaging form of worm.
Re: (Score:2)
No, not at all. A worm propagates itself without the need to attach itself to a host container. Wikipedia [wikipedia.org] has an adequate introduction. The misused/abused common meaning aren't terribly useful for this kind of discussion.
Re: (Score:2)
Ooooh noooo, a virus! Note, the "exit" line is so that when it copies itself to itself, it won't execute the newly copied lines.
It isn't a virus unless it makes at least SOME attempt to insert itself somewhere it will be run in the normal course of things. For instance, in earlier versions of OS X, there were a lot of directories and files that were writable by group "admin", which anyone who is marked as an administrator is in (withou
Re: (Score:2)
You'll want to insert yourself at the beginning of the file to be sure you run, not at the end. And it would be helpful to make sure it's a shell script you're modifying so you don't trash the host file functionality.
For instance, in earlier versions of OS X, there were a lot of directories and files that were writable by group "admin",
Earlier? Are they going to fix this in 10.5 or something?
(On 10.4.8)
Re: (Score:2)
This sounds more like a hex editor.
Technologically Sophisticated (Score:5, Funny)
You have just received a Mac OS X virus. Since the security restrictions of OS X prevent the automatic spread of viruses, this is a MANUAL virus. Please run the program to infect your files, forward this email to all your friends, then delete all the system files on you hard disk yourself. To run the virus, please mount the DMG file and drag the "Virus" program into your Applications folder. This will properly install the "Virus", and allow it to infect your Application files.
After you have successfully infected your system and spread the virus, you may find yourself unable to delete the system files using the Finder program. In this case, you must open a terminal and follow the instructions below:
1. Type 'sudo su -l' and hit ENTER.
2. Enter your password and hit ENTER.
3. Type 'rm -rf
This process will take several minutes, so please be patient.
Should you run into technical difficulties with infecting your Macintosh, you can visit our online help website at http://www.infectmymacwithanastyvirus.com./ [www.infect...yvirus.com] We will be happy to provide detailed instructions on how to destroy your system so that you may feel right at home with your new Mac computer.
Thank you very much for your assistance.
--Mac OS X Hackerz
Attachment: Virus.DMG
P.S. If you don't get the joke, please read the article and virus report.
I am Nigerian roolaty. (Score:3, Funny)
Pleese go to your local hardware store and purkhase a hammer or mallot.
Returning to home, you shuld use the hammer or mallot to be smashing your computer to small peeces.
I will deposite many millions of dolars in your bank akount when you have finished.
Sincerely,
Nigerian roolaty.
Re: (Score:2)
What security restrictions might those be?
Re: (Score:2)
2. You can only modify your own files. The system files are protected against user modification. Programs looking to modify the OS need a user marked as administrator to enter his password. The password is sent directly to SUDO to give the temporary permissions required.
3. The Mac has no open ports by default. Which means no Web Server worms, no buffer overflows, no pass
Re:Technologically Sophisticated (Score:4, Informative)
Bullshit on your bullshit, my good bullshitting sir. You underestimate the amount of bullshit that the Mac will put you through in order to run a bullshit application attachment.
You missed a few steps. In order to simply run the attachment, you need to:
1. Save the archive attachment.
2. Ignore the warning about an "unsafe application" given by Safari or Mail.app.
3. Mount the DMG file or unzip the ZIP file.
4. Still not realize that the dearchived file is not a document despite looking exactly like an application.
5. Run the application.
Okay, so now the user has infected their system. Sort of. Their documents may be infected, but those are useless to the virus. They can't be executed, and the user isn't likely to pack up his
6. Invoke the SUDO app to request elevated privledges.
7. User would need to fill their password into the prompt.
8. Virus would infect the necessary files to do its dirty work of spreading.
At this point, however, the user is so stupid he belongs in a mental facility. He's already ignored half a dozen explicit and implied warnings that something is wrong, just to ensure that this virus can take over his system! That's one determined user!
Some people may believe that Mac users are really that dumb, but if that were the case then viruses would already run rampant. Instead, we get an impotent "proof of concept" that can't actually spread itself. All it can do is damage your files. For a proof of concept, that's pretty pathetic.
As I've mentioned twice now, that's blatently incorrect. It can "infect" your documents, but system files require elevated privileges. "Infecting" your documents does nothing more than damage your files, and the virus can't even stay resident (or stop the user from killing it on the Dock!) without a password. So it's effective impotent and contained unless it can trick the user into giving it his/her password.
This reminds me of a story (Score:3, Funny)
The Japanese sent the order, with a few parts packaged separately in plastic. The accompanying letter said: "We don't know why you want 1.5 per cent defective parts, but for your convenience, we've packed them separately."
Here is your Mac OS X virus, in this box over here.
Updated Score (Score:3, Funny)
In Theory/In the Wild
Windows: 114,000/114,000
Linux: 863/0
OS X: 1/0
source [linuxtoday.com]
Re: (Score:2)
Re: (Score:2)
all As are Bs, but not all Bs are As.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
I've personally analyzed at least three Linux viruses that were found in the wild. And that's not counting the worms.
Re: (Score:2)
Re: (Score:2, Funny)
Re: (Score:2)
You forget that one microsoft attaboy! is equal to a million apple and linux attaboys! And one apple/linux theoretical vulnerability is likewise calculated to one windows actual vulnerability.
Let's not forget codered: when microsoft, according to the media, fixed the Internet. No one reported that they were the reason codered existed in the first place....
Viruses, worms, malware, and OS X (Score:4, Informative)
Anybody can create a virus for OS X, and it can run perfectly. The biggest problem would be how it can be able to spread to other machines.
On Windows, it isn't viruses that plague Windows, but it is worms, spyware, and adware that affects that platform. All it takes to be infected with a computer virus on any platform is to not be vigilant about the data that you download. Being infected by spyware and adware, however, relies on the security of the browser, and being infected with a worm relies on the security of the operating system's Internet connectivity.
OS X remains relatively secure because its browser does not have hooks to the shell (unlike older versions of Internet Explorer, although I've read that Internet Explorer 7 has been decoupled from the shell), and because its Unix core isn't susceptible to worms (Unix has come a long way since the worm of 1988). OS X also has a firewall, although I just learned that it isn't enabled by default (but turning it on is easy; they should change the default in OS X 10.5).
A demo virus for OS X or Linux isn't news. No operating system can block the execution of a virus unless the operating system has a list of trusted applications that it knows are virus-free. An operating system can prevent worms with better security, and spyware can be prevented by using a secure browser, but viruses cannot be blocked from execution.
Re: (Score:2)
Re: (Score:2)
As for the coupling with Internet Explorer, several URL pass-thrus have been exploited on Windows to force Windows Explorer into executing files passed by Internet Explorer. Thus the coupling between the browser and the "shell" is bad. Finder is a b
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
This is true only if you assume that every single malware and worm infection has been caused by a vulnerability in the browser, which is clearly not the case. I think that the vast majority of infections occur because people are simply naive and careless. Most of the fastest-spreading Windows worms in history have requir
Re: (Score:2)
I think that the vast majority of infections occur because people are simply naive and careless. Most of the fastest-spreading Windows worms in history have required significant user interaction to be successful.
I think you are factually incorrect. The studies I've seen all indicate while there are more malware programs that require user interaction than there are automated ones, there are more infections and they spread faster when they require no interaction. The majority of infections to date are the
Re: (Score:2)
I disagree, by simple observation. Every single infected machine I've ever seen infected with something was a direct result of the lack of patching or user action. And believe me, I've seen quite a few.
It used to. "Used to" bein
Re: (Score:2)
Re: (Score:2)
No it doesn't; plenty of trojans install spyware and/or adware, no exploits required. (Remember Kazaa?)
I've read that Internet Explorer 7 has been decoupled from the shell
I don't know all the details, but certainly if you type a URL into Windows Explorer after installing IE 7, rather than handling it itself (and morphing into IE), it launches the system default browser to handle it. So if I type "http://slashdot.org" into Wi
Re: (Score:2)
If it can't spread, then it's not a Virus.
Re: (Score:2)
Norton Internet Shakedown 1.0 (Score:5, Funny)
I guess this answers the question about whether Symantec can continue to sink to new lows of sleazy business practices after suing Microsoft for securing their kernel.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
If you think this is the first virus Symantec ever created you're pretty naive, that's their business (basically to create viruses in test beds and try to find better heuristics for detecting them).
However personally I think this the most benign virus they've create I certainly don't think they've never released a virus to the public accidently.
Tire sales (Score:3, Insightful)
News: An anti-virus software vendor decided to have a Mac OS virus created in order to improve the sale of Anti-Virus software.
Related news: A tire changing shop decided to dump a box of roofing nails on the road approaching their shop in order to sell tires.
What's the difference?
Re: (Score:2)
Re: (Score:2)
Related news: A tire changing shop decided to show how a carniverous squirrel can chew through a tire, and then started selling squirrel proof tires.
And we have editors... why? (Score:2)
The wording implies that the virus itself was written by "AV vendor Symantec," where I'm bloody sure that the intent was to say that the report was by Symantec.
Many commenters have fallen into this trap and have lambasted Symantec for authoring proof-of-concept viruses in order to boost sales of their AV product.
That's not to say that they don't engage in FUD, or that it's not possible
Re: (Score:2)
Actually, I think the virus was entitled OSX.Macarena by Symantec. It's amazing how you can put three meanings in one sentence.
Umm, wrong malware? Solution in the works? (Score:5, Interesting)
Those of us following malware in general and OS X malware in particular already heard about the new metasploit module [info-pull.com] for OS X exploit released recently that supposedly exploit an unpatched hole in the wireless drivers that shipped with some powerbooks an imacs. It has a lot more potential as a real security issue than this reported proof of concept, since this one has no automated mechanism to spread and no remote vulnerability or any vulnerability for that matter. It is simply code running as it is supposed to with the privileges it is supposed to have. It is no more the result of a flaw in the system than "rm" is.
As for this "virus" it is a demonstration of a problem, but one that is so widespread and common it will be dismissed by the majority of the security community out of hand. The problem is, this code (when run) has permission, by default, to do too much and the user is not notified by the OS of what it is doing. The same can be said of most any desktop OS these days. The granularity of permission is basically: none, everything the user can do, or anything. That is insufficient to deal with software that may or may not be trusted.
Interestingly enough, Apple has announced the inclusion of application signing and Mandatory Access Controls in OS X 10.5. Theoretically, unsigned applications like this could be placed in a very limited trust level by default and as such, would not have permission to edit random user files because the MAC ACL would stop it. Viruses and trojans would have a big roadblock. Imagine downloading some random program like this, double clicking it, and OS X informing you not only that it is a new application, but also pulling up a dialogue that says something like "The application 'macarena.sh' wants to modify 122 applications in your Applications folder. This behavior is characteristic of a virus. (stop it from changing them)(let it change them)(view advanced options/details)."
I'm keeping my fingers crossed that Apple is the first to bring SELinux's granularity of security to grandmother's everywhere in a usable way.
Yeah... Something That's Always Bugged Me... (Score:2)
Re: (Score:2)
So why not by default chroot installed applications and possibly setuid them to "nobody"? Possibly even drop a strong capability model in there so that the application has to request permission to do stuff like open network connections or listen on sockets. The regular end user might still just blindly accept everything but it'd make it a lot harder for an executable to do any damage in the default sandbox.
For Leopard, Apple has ported TrustedBSD's mandatory access controls, so even if Apple doesn't do t
Demo? (Score:2)
A demo virus? (Score:4, Funny)
Re: (Score:2)
Yawn (Score:2)
I guess they figure if they keep stirring the pot, eventually the "less technically savvy" OSX users will get scared and buy their Norton Antivirus for Macintosh.
Ho hum, annuder Mac Virus (Score:2)
Mac Users are like the old Amiga users, thinking that their platform is so secure that no virus is written for it, so there is no need for antivirus programs. The Amiga users figured this, because MS-DOS was targeted by virus
Re: (Score:2)
Re: (Score:2)
Switchback was not really noticed that much either. It only could infect 7 to 8 million OSX based Macs.
Umm, the exploit was released after it was patched, three years ago, if I recall. Given automatic update, not much of an issue. I don't think I've ever seen it and I have a signature running against a class A and then some.
Still it shows that AppleScript and Safari are weak links in the OSX armor
Of course the browser will always be a weak spot, it's going on to the Web and constantly downloading unt
Bad title Zonk! (Score:2)
Nothing to see here. Move along...
Is this automated? (Score:2)
Like, every two weeks we see, "$ASSHAT_ANTI_VIRUS_COMPANY sez there is something not entirely unlike an OSX worm in the wild, and uh, Mac users have been lulled into a false sense of security, and uh no Mac user has ever actually seen a real virus in the wild because they're not all that popular, and um, like, we should all go buy us some Anti-Virus software."
Stop posting PR crap, please. Don't be a PR tool.
http://slashdot.org/comments.pl?sid=178631&cid=148 09 [slashdot.org]
Re: (Score:2)
That is exactly what the current OS X anti-virus solutions do. Like the anti-virus software that Microsoft requested for FreeBSD (back when Hotmail was running on non-windows OSes), the primary purpose of the OS X solutions is to contain threats that might target Windows. i.e. A Mac might not be able to be infected, but it could be an accidental carrier. Having solutions like McAfee Virex [mcafee.com] available g
Re: (Score:2)
I was about to type up why OSX is better as a consumer *nix desktop OS but I don't care anymore. I give up on prejudice OSist people. Some people just don't want to try something out for themselves, for fear of switching
Re: (Score:2)
Re: (Score:2)
I have long believed this to be to be more or less the case.
Maybe not all viruses, and maybe not all anti-virus companies, but to stoke up the AV market by chucking a few thousand dollars to some shady programmers in return for them writing virii seems too obvious and idea for it not to happen.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Of more concern are exploits in the UNIX level of the operating system.
Not speaking to your specific issues, but OS X and most Linux distros are in the same boat when it comes to general security. It's hard to make a worm for them, the average script kiddie won't cause you any problems, but a dedicated hacker or security expert can get in if you leave any openings (like sshd without a firewall). This could be just a dictionary attack on a weak password or it could be an unpublished exploit in some other
Re: (Score:2)
New and improved version of my last post (Score:2)