Feeds

Apple fanbois warned: No, Cupertino HASN'T built a Bitcoin mining function into Macs

If you follow tech guidelines from 4chan, you're an idiot

Build a business case: developing custom apps

The denizens of internet horror-forum 4chan have come up with a hoax designed to trick Mac fans into deleting all the files on their machines by running commands supposedly needed to turn on hidden Bitcoin mining features.

Apple's so-called secret mining feature, which 4channers claim has been present in Macs since 2009, can be unlocked by opening a terminal command line and running the following command: sudo rm -rf/*, viral images falsely claim.

Do not try this at home – or anywhere else, come to that. In reality, typing rm -rf/* on a Unix system (including Mac OS X) tells your computer to delete all of your files and folders.

The more tech-savvy folk on 4chan would take the bogus flier as the slightly twisted joke it's probably intended to be. But, as with any in-joke, there's a danger that less technically knowledgeable people might be taken in, warns veteran security researcher Graham Cluley.

"With many people intrigued by mainstream newspaper stories about Bitcoins, but lacking in knowledge about how to dip their toe into the waters of Bitcoin mining, there is a danger that some folks could take the advice seriously," Cluley writes in a blog post featuring screenshots of the deliberately misleading flier.

"Most of the denizens of 4Chan are probably in on the joke, and will give an evil grin at the suggestion. But there’s always a danger that other wannabe Bitcoin miners will see the “advice” and follow it to the letter with data-destroying results."

An article by the Daily Dot suggests the hoax has already claimed a number of victims.

It seems the inmates of 4chan’s random imageboard /b/ are following up on the recent Xbox One bricking hoax with a ruse designed to trick the less knowledgeable into auto-trashing all the files on their Apple computers.

Last weekend malicious /b/ pranksters pushed a fake advisory seeking to trick Xbox One owners into bricking their consoles by following a set of instructions that supposedly made the latest version of Microsoft's gaming console backwards compatible with Xbox 360 games. Instead it made the console inoperable.

The Xbox wheeze was far more plausible – and created far more problems – than the latest rash of mischief. The Daily Dot adds that the Xbox hoax has even spawned secondary ruses involving supposed instructions to restore a bricked Xbox One console that, in reality, will result in a knackered PC to go with a borked gaming console.

This latter ruse surfaced in the image community 9gag and not /b/, which is notorious as the birthplace of Anonymous and much more besides. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?