Feeds

Lame Mac 'email worm' limps into view

Riddled with bugs and rather sad

Boost IT visibility and business value

Virus writers have created a worm that seeks to establish a botnet of compromised Mac machines. But the Tored Mac worm, which attempts to spread via email, is so hopelessly buggy and lame that it's about as likely to score as Steve Ballmer at an Apple convention.

Strains of Mac malware are, of course, dwarfed by factors that run into the hundreds of thousands, if not millions, by types of Windows-specific viruses. The small, although growing, number of Mac malware strains that do exist are typically Trojans that pose as video codecs or pirated versions of iWork. Such Trojans commonly frequent multimedia websites (actually run by hackers) or P2P networks.

Tored takes a different approach towards attacking Mac fans - but that's one of the few factors in its favour. Net security firm Sophos explains that Tored is an email-aware worm which attempts to harvest email addresses from Mac machines it infects, before forwarding copies of itself to those targeted accounts.

The malware was created in Tunisia and aims to be the first Mac OS X botnet agent, according to comments in the source code of the malware.

Except a Mac-specific Trojan discovered in April has a better claim to the title "first Mac OS X botnet agent". Furthermore Tored is riddled with so many mistakes it's incapable of doing any harm, Sophos reports.

"Bugs in the worm's code, however, mean it is unlikely that you will ever encounter it, even if the author had taken the time to correct the many spelling mistakes in the emails it tries to send," writes Graham Cluley, a senior technology consultant at Sophos.

The author of the code has adopted a novel approach in order to encourage its spread, or just to apologise for inconveniencing Windows and Linux users. A message in the code reads:

For Mac OS X ! :(If you are not on Mac please transfer this mail to a Mac and sorry for our fault :)

It's hard to view messages like this as anything better than hopelessly lame.

Recent publicity over the Conficker superworm left Mac-specialist security firms well out of the spotlight. Those worried that Mac machines will become the next building blocks for botnets can however sleep tight in the knowledge that virus watchers at Intego maintained a round the clock watch in late March just in case a "Mac OS X variant of this worm should appear". ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?