Posts tagged #Mac

Mac OSX Java Malware: OSX/Flashfake.c

This Trojan is installed via exploitation of a flaw in Oracle Java (CVE-2012-0507). The Mac OS X - based malware masquerades as an Adobe Flash Player install.

Upon infection the malware will install fake/rogue security software, and allow for the downloading of additional malicious components, sensitive data extrusion, and other malicious control methods.

Infected hosts report back to an external server and can receive further instructions/payloads via that method (C&C / bot-based control). CVE-2012-0507 is an Oracle Java vulnerability, which was patched by Apple (as a 34rd party component) in April 2012.

Therefore....make sure your OSX software is up to date

 

Posted on April 7, 2012 .

Microsoft Word Document Malware

Updating Word for Mac to the latests version protects you against this:

Exploit-OLE2.gen

MTIS12-053-A

THREAT IDENTIFIER(S)

Exploit-OLE2.gen;?Mac Control? RAT

THREAT TYPE

Malware

RISK ASSESSMENT

Medium/On-Watch

MAIN THREAT VECTORS

Web; E-Mail; WAN; LAN

USER INTERACTION REQUIRED

Yes

DESCRIPTION

The Exploit-OLE2.gen trojan disguises itself as a Word Document. Upon opening in a vulnerable Mac system, it executes a script that writes the malware itself and then a shell script that runs it. The malware takes advantage of a Java vulnerability patched by Microsoft in Bulletin MS09-027. In the variants observed, the malware is stored as binary files called "DockLight" or "launchd" while showing the user a text about Tibetan freedom and grievances. Both binaries can be easily found just by looking for them in the system.

IMPORTANCE

Medium. This threat has gained media attention

Posted on March 29, 2012 .

Apple Safari Vulnerability

A vulnerability affecting Apple Safari has just been discovered.

By tricking the user into opening a malicious web page, an attacker may be able to execute arbitrary code. Exploit code for this vulnerability is publicly available.

The only fix available as of now, until Apple offers a patch, is to disable Javascript under 'Preferences', 'Security'

The other option is to use Firefox 3.6 with the NoScript add-on, or Google Chrome. It is likely that Google Chrome is not affected by this vulnerability.

Posted on May 10, 2010 .