Feeds

Hackers serve up pre-release malware to Mac fanboys

Snow Leopard scuppered, f*cks it for Foxit

Choosing a cloud hosting partner with confidence

Virus slingers are taking advantage of the release of Apple's Snow Leopard operating system by offering malware from sites touting operating system upgrades.

Dodgy sites supposedly offering Snow Leopard were rigged to push an Apple-specific DNS changer Trojan, detected by Trend Micro as JAHLAV-K. The malware is a MAC OS X mountable Disk Image file (.DMG) that comes contaminated with various malicious scripts, as explained here.

Users infected with the Apple specific malware would find their internet connections redirected to phishing sites and other fraudulent endeavours. Some of these bogus sites hosted scareware (fake anti-virus) packages.

Fake sites offering the Mac malware were in operation in the run-up to the release of Snow Leopard on Friday. There are more details in a blog on Trend Micro's website, here.

A similar attack, detected earlier this week, offered malware in the guise of Foxit PDF Reader software for Apple Macs. The pirated version "Foxit Reader for Mac" comes loaded with the Jahlav Trojan horse, anti-virus firm Sophos warns.

Foxit Reader is not yet officially available for Apple Macs. When it does come out, prospective users ought to use the official Foxit website, Foxit advises.

"While imitation may be the sincerest form of flattery, we are not happy about the recent malware attacks masquerading as our Foxit Reader," said George Gao, vice president of sales and marketing at Foxit Corporation. "Foxit has always striven to insure that our solutions are secure for our users, and remains committed to address any Foxit product security issue in a professional and timely manner." ®

Remote control for virtualized desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.