Feeds

Google makes malware microscope Mac mod

Cupertino wants intel on Apple VXer plays

Securing Web Applications Made Simple and Scalable

Google has upgraded its popular VirusTotal analysis tool by adding an Mac OS malware uploader in a bid to better understand increasing attacks against Cupertino's fruity 'puters.

The tool has been made available for OS X 10.8 and 10.9.

Malware and suspicious URL samples uploaded to VirusTotal are checked against 52 anti-malware products to test for malicious components. Google sent samples to anti-virus outfits that failed to detect known malicious wares.

Technical account manager Karl Hiramoto said the popular security and research tool acquired in September 2012 would give security bods better intel into the Mac malware scene.

“Hopefully this will lead to VirusTotal receiving more Mac applications, diving deeper into an increasingly targeted OS by attackers and allowing anti-virus companies and researchers making use of VirusTotal’s backend to build stronger defenses against these threats," Hiramoto said in a post.

Like many white hat security tools VirusTotal was popular with VXers who used the service to test the effectiveness of their malware obfuscation techniques before commencing large-scale attacks.

The double edge of the new uploader meant it could allow crooks to test detection rates for their Mac malware which at present would likely be low.

The first most significant Mac malware outbreak to date occured in 1998 with AutoStart 9805 worm, which emerged in Hong Kong and spread throughout the world. In 2006 the first virus, dubbed Leap-A, hit Mac OS X.

A year later the financially-driven RSPlug Mac malware was discovered. Since then Mac VXers had developed more sophisticated malware such as FlashBack which at its peak had infected 600,000 Macs.

Those incidents all made it plain that the Mac is not invulnerable. Just why Google has decided now is the time to subject Mac OS to wider investigation is not known, but it is not hard to suspect someone, somewhere, feels Apple's platform now needs extra attention. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.