Feeds

Google makes malware microscope Mac mod

Cupertino wants intel on Apple VXer plays

Website security in corporate America

Google has upgraded its popular VirusTotal analysis tool by adding an Mac OS malware uploader in a bid to better understand increasing attacks against Cupertino's fruity 'puters.

The tool has been made available for OS X 10.8 and 10.9.

Malware and suspicious URL samples uploaded to VirusTotal are checked against 52 anti-malware products to test for malicious components. Google sent samples to anti-virus outfits that failed to detect known malicious wares.

Technical account manager Karl Hiramoto said the popular security and research tool acquired in September 2012 would give security bods better intel into the Mac malware scene.

“Hopefully this will lead to VirusTotal receiving more Mac applications, diving deeper into an increasingly targeted OS by attackers and allowing anti-virus companies and researchers making use of VirusTotal’s backend to build stronger defenses against these threats," Hiramoto said in a post.

Like many white hat security tools VirusTotal was popular with VXers who used the service to test the effectiveness of their malware obfuscation techniques before commencing large-scale attacks.

The double edge of the new uploader meant it could allow crooks to test detection rates for their Mac malware which at present would likely be low.

The first most significant Mac malware outbreak to date occured in 1998 with AutoStart 9805 worm, which emerged in Hong Kong and spread throughout the world. In 2006 the first virus, dubbed Leap-A, hit Mac OS X.

A year later the financially-driven RSPlug Mac malware was discovered. Since then Mac VXers had developed more sophisticated malware such as FlashBack which at its peak had infected 600,000 Macs.

Those incidents all made it plain that the Mac is not invulnerable. Just why Google has decided now is the time to subject Mac OS to wider investigation is not known, but it is not hard to suspect someone, somewhere, feels Apple's platform now needs extra attention. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.