Feeds

Apple showers love on Mac malware protection

Feeds Snow Leopard's neglected Xprotect

Remote control for virtualized desktops

For only the second time in 19 months, Apple has updated the signatures used to protect Mac users against malware attacks.

An update released Monday for Mac OS X 10.6, aka, Snow Leopard, adds detection for a trojan known as OSX.OpinionSpy. The malware comes bundled with Mac screensavers and applications available on various websites, according to Marco Preuss , a researcher with antivirus provider Kaspersky Labs. Once installed, OpinionSpy mines personal information entered into Safari, Firefox and elsewhere and sends it to servers controlled by the attackers.

Kaspersky has seen just 13 OpinionSpy infections since the beginning of the year, mainly by users located in India.

OpinionSpy warning delivered by Snow Leopard

The addition brings the total number of malware signatures included in Snow Leopard to four. The malware protection debuted in an OS X beta released in mid 2009 with signatures for just two well-known Mac trojans, known as RSPlug and iServices. Apple later updated the malware protection to detect a backdoor threat known as HellRTC, which was detected in April, according to Mac AV provider Intego.

The protection, which many are calling Xprotect, provides a popup window that warns users that the program they are trying to install “will damage your computer” and should be moved to trash. The warning is provided only when the files are downloaded using Safari, Firefox, Mail, Entourage, iChat and a handful of other applications. According to an analysis from 2009, the window is not activated if the same malicious file has been downloaded using Skype or transferred from a DVD, CD or thumb drive.

It's unclear what the criteria is for adding signatures to Xprotect. Mac security experts say the number of known malware applications that target OS X is probably in the hundreds.

The addition was part of a monster package of Snow Leopard security patches that fixed 56 vulnerabilities, including one that researcher Charlie Miller had hoped to use two weeks ago at the annual Pwn2Own hacker contest. The exploit went unused because another contestant drew a higher lottery number and was able to compromise the Mac dedicated to the competition first.

At least 45 of the bugs Apple fixed on Monday made it possible for attackers to execute malicious code, according to Apple's advisory. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?