Feeds

'Mac worm' hacker in death threat farce

Much ado about malware

Top 5 reasons to deploy VMware with Tegile

Claims by an anonymous author that he was paid to create a worm targeting Mac OS X systems are turning into a soap opera-style farce. Infosec Sellout said his 'Rape-OSX' worm uses an undisclosed vulnerability in the mDNSResponder component of Mac OS X to spread.

Low-threat malware targeting Mac OS X systems is unusual, but far from unprecedented. Claims that the supposed author of the worm is being paid to create proof-of-concept malware lack credibility or rationale, aside from creating mischief.

The original 15 July post on Infosec Sellout's blog, which has since been stripped of detail, said: "I wrote this for my own purposes and it will be demonstrated to those who asked me to engage in this work. Yes, I am being compensated for this (Hi, Joanna)."

The information security community is a small, almost exclusively male clique. The only Joanna of note is Joanna Rutkowska, founder of Invisible Things Lab, a noted security researcher who developed the Blue Pill rootkit to illustrate the security shortcoming of Windows Vista's anti-malware defences.

Rutkowska told eWeek that she doesn't know Infosec Sellout and certainly hasn't paid anybody to write worms.

Infosec Sellout was "identified" as LMH, someone associated with the Phrack High Council (PHC), on Cutaway Security's blog on 17 July, based on an anonymous chat-room conversation. PHC aims to cause grief to responsible white-hat hackers.

Whether this is true or not remains unclear, but soon after this Infosec Sellout's blog was "hacked", renamed "Security Information", and stripped of almost all its posts. One of the two posts left on the blog provides a link to information on the alleged worm, but none of them detail of the original post.

IDG reports that death threats were posted on the blog prior to the hack, adding further spice to an already heady mix.

Rape-OSX is looking more and more a work of mischief rather than mayhem. Perhaps we should thank Infosec Sellout for enlivening an otherwise dull week in information security with his gonzo-style pranks? ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.