Feeds

Lame Mac 'email worm' limps into view

Riddled with bugs and rather sad

The Essential Guide to IT Transformation

Virus writers have created a worm that seeks to establish a botnet of compromised Mac machines. But the Tored Mac worm, which attempts to spread via email, is so hopelessly buggy and lame that it's about as likely to score as Steve Ballmer at an Apple convention.

Strains of Mac malware are, of course, dwarfed by factors that run into the hundreds of thousands, if not millions, by types of Windows-specific viruses. The small, although growing, number of Mac malware strains that do exist are typically Trojans that pose as video codecs or pirated versions of iWork. Such Trojans commonly frequent multimedia websites (actually run by hackers) or P2P networks.

Tored takes a different approach towards attacking Mac fans - but that's one of the few factors in its favour. Net security firm Sophos explains that Tored is an email-aware worm which attempts to harvest email addresses from Mac machines it infects, before forwarding copies of itself to those targeted accounts.

The malware was created in Tunisia and aims to be the first Mac OS X botnet agent, according to comments in the source code of the malware.

Except a Mac-specific Trojan discovered in April has a better claim to the title "first Mac OS X botnet agent". Furthermore Tored is riddled with so many mistakes it's incapable of doing any harm, Sophos reports.

"Bugs in the worm's code, however, mean it is unlikely that you will ever encounter it, even if the author had taken the time to correct the many spelling mistakes in the emails it tries to send," writes Graham Cluley, a senior technology consultant at Sophos.

The author of the code has adopted a novel approach in order to encourage its spread, or just to apologise for inconveniencing Windows and Linux users. A message in the code reads:

For Mac OS X ! :(If you are not on Mac please transfer this mail to a Mac and sorry for our fault :)

It's hard to view messages like this as anything better than hopelessly lame.

Recent publicity over the Conficker superworm left Mac-specialist security firms well out of the spotlight. Those worried that Mac machines will become the next building blocks for botnets can however sleep tight in the knowledge that virus watchers at Intego maintained a round the clock watch in late March just in case a "Mac OS X variant of this worm should appear". ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.