Feeds

Lame Mac 'email worm' limps into view

Riddled with bugs and rather sad

The Essential Guide to IT Transformation

Virus writers have created a worm that seeks to establish a botnet of compromised Mac machines. But the Tored Mac worm, which attempts to spread via email, is so hopelessly buggy and lame that it's about as likely to score as Steve Ballmer at an Apple convention.

Strains of Mac malware are, of course, dwarfed by factors that run into the hundreds of thousands, if not millions, by types of Windows-specific viruses. The small, although growing, number of Mac malware strains that do exist are typically Trojans that pose as video codecs or pirated versions of iWork. Such Trojans commonly frequent multimedia websites (actually run by hackers) or P2P networks.

Tored takes a different approach towards attacking Mac fans - but that's one of the few factors in its favour. Net security firm Sophos explains that Tored is an email-aware worm which attempts to harvest email addresses from Mac machines it infects, before forwarding copies of itself to those targeted accounts.

The malware was created in Tunisia and aims to be the first Mac OS X botnet agent, according to comments in the source code of the malware.

Except a Mac-specific Trojan discovered in April has a better claim to the title "first Mac OS X botnet agent". Furthermore Tored is riddled with so many mistakes it's incapable of doing any harm, Sophos reports.

"Bugs in the worm's code, however, mean it is unlikely that you will ever encounter it, even if the author had taken the time to correct the many spelling mistakes in the emails it tries to send," writes Graham Cluley, a senior technology consultant at Sophos.

The author of the code has adopted a novel approach in order to encourage its spread, or just to apologise for inconveniencing Windows and Linux users. A message in the code reads:

For Mac OS X ! :(If you are not on Mac please transfer this mail to a Mac and sorry for our fault :)

It's hard to view messages like this as anything better than hopelessly lame.

Recent publicity over the Conficker superworm left Mac-specialist security firms well out of the spotlight. Those worried that Mac machines will become the next building blocks for botnets can however sleep tight in the knowledge that virus watchers at Intego maintained a round the clock watch in late March just in case a "Mac OS X variant of this worm should appear". ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.