{"id":10560,"date":"2012-08-28T19:30:38","date_gmt":"2012-08-28T23:30:38","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=10560"},"modified":"2021-07-28T15:19:23","modified_gmt":"2021-07-28T19:19:23","slug":"a-history-of-mac-malware-part-1","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/a-history-of-mac-malware-part-1\/","title":{"rendered":"A History of Mac Malware: Part 1"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20150131151730\/http:\/\/www.tuaw.com\/2012\/07\/11\/malware-affecting-macs-running-older-versions-of-os-x\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-101738\" title=\"A History of Mac Malware: Part 1\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mac_sick-1.jpg?resize=100%2C131&#038;ssl=1\" alt=\"A History of Mac Malware: Part 1\" width=\"100\" height=\"131\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mac_sick-1.jpg?resize=114%2C150&amp;ssl=1 114w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mac_sick-1.jpg?resize=57%2C75&amp;ssl=1 57w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mac_sick-1.jpg?w=220&amp;ssl=1 220w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a><a title=\"Graham Cluley\" href=\"http:\/\/nakedsecurity.sophos.com\/author\/gcluley\/\" target=\"_blank\" rel=\"noopener noreferrer\">Graham Cluley<\/a> at <a title=\"Sophos\" href=\"https:\/\/www.sophos.com\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a> recently <a title=\"The short history of Mac malware: 1982 - 2011\" href=\"https:\/\/nakedsecurity.sophos.com\/2011\/10\/03\/mac-malware-history\/\" target=\"_blank\" rel=\"noopener noreferrer\">wrote<\/a> an excellent history of Apple Macintosh malware. He points out that Mac malware is a subject that raises strong emotions. There are some who believe that the problem is over-hyped and others who believe that the malware problem on Macs is underestimated by the Apple-loving community. The author writes that hopefully, this short history will go some way to present the facts and encourage sensible debate. <em>(rb- We have just taken on a new customer which is 85% Mac and 15% PC. I have had this very conversation with my Apple certified tech who does the field support.)<br \/>\n<\/em><\/p>\n<p><em><a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-4Bk\" target=\"_blank\" rel=\"noopener\">Click here<\/a> for part two of this series. <a title=\"First PC Virus Creators Found\" href=\"https:\/\/wp.me\/p2wgaW-1VJ\" target=\"_blank\" rel=\"noopener\">Click here<\/a> to read my recent series commemorating the 25th anniversary of the computer virus.<\/em><\/p>\n<p><a href=\"http:\/\/oldcomputers.net\/appleii.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101740\" title=\"Apple II\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/appleii-system.jpg?resize=147%2C100&#038;ssl=1\" alt=\"Apple II\" width=\"147\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/appleii-system.jpg?resize=150%2C102&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/appleii-system.jpg?resize=75%2C51&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/appleii-system.jpg?w=550&amp;ssl=1 550w\" sizes=\"auto, (max-width: 147px) 100vw, 147px\" \/><\/a><strong>1982 &#8211; <a title=\"Apple II\" href=\"http:\/\/oldcomputers.net\/appleii.html\" target=\"_blank\" rel=\"noopener noreferrer\">Apple II<\/a><\/strong> &#8211; The first virus to affect Apple computers wasn&#8217;t written for the Macintosh (the original Mac did appear until <a title=\"1984\" href=\"http:\/\/youtu.be\/2zfqw8nhUwA\" target=\"_blank\" rel=\"noopener noreferrer\">1984<\/a>). 15-year-old student Rich Skrenta wrote the <a title=\"Elk Cloner\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/Elk-Cloner\" target=\"_blank\" rel=\"noopener noreferrer\">Elk Cloner virus<\/a>, capable of infecting the boot sector of Apple II computers. On every 50th boot the <a title=\"Elk Cloner\" href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/malware-history-part-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Elk Cloner<\/a> virus would display a short poem:<\/p>\n<p><em>It will get on all your disks<\/em><br \/>\n<em> It will infiltrate your chips<\/em><br \/>\n<em> Yes, it&#8217;s Cloner!<\/em><\/p>\n<p><em>It will stick to you like glue<\/em><br \/>\n<em> It will modify RAM too<\/em><br \/>\n<em> Send in the Cloner!<\/em><\/p>\n<p>The blog says many Apple fans are surprised that the <a title=\"Elk Cloner\" href=\"https:\/\/www.techopedia.com\/definition\/25199\/elk-cloner\" target=\"_blank\" rel=\"noopener noreferrer\">Elk Cloner<\/a> boot sector virus predates\u00a0<a title=\"IBM\" href=\"http:\/\/www.ibm.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM<\/a> (<a title=\"NYSE : IBM\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:IBM\" target=\"_blank\" rel=\"noopener noreferrer\">IBM<\/a>) PC viruses by some years. (<em>I got my first paying tech job using an Apple II and PFS:File to build a database<\/em>).<\/p>\n<p><strong>1987 &#8211; <a title=\"Apple Macintosh computer\" href=\"http:\/\/www.everymac.com\/systems\/apple\/mac_classic\/specs\/mac_se30.html\" target=\"_blank\" rel=\"noopener noreferrer\">Macintosh<\/a><\/strong> &#8211; The <a title=\"nVIR\" href=\"https:\/\/web.archive.org\/web\/20200412160253\/https:\/\/www.sophos.com\/en-us\/threat-center\/threat-analyses\/viruses-and-spyware\/Mac~nVIR-A.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">nVIR virus<\/a> began to infect Apple Macintosh computers, spreading its malware mainly by floppy disk. It was a similar story to what was happening in the world of MS-DOS malware, where viruses would typically travel from computer to computer by users sharing floppy disks.<\/p>\n<p>Source code for nVIR was later made available, causing a rash of variants for the Mac platform. The author writes that the first anti-virus products for Mac, some free, some commercial, began to emerge in response th this malware. (<em>In my first tech support Job, I got very familiar with the Mac 30\/SE, since there was a computer lab full of them with a <a title=\"SCSI chain\" href=\"https:\/\/www.pcmag.com\/encyclopedia\/term\/scsi-chain\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">SCSI chain<\/a> from the Mac to an external hard drive to a scanner. They also printed to a <a title=\"Apple Laserwriter printer\" href=\"https:\/\/web.archive.org\/web\/20240303120146\/http:\/\/www.retrotechnology.com\/herbs_stuff\/m_print.html\" target=\"_blank\" rel=\"noopener noreferrer\">LaserWriter 2<\/a> with <a title=\"AppleTalk\" href=\"http:\/\/searchnetworking.techtarget.com\/definition\/AppleTalk\" target=\"_blank\" rel=\"noopener noreferrer\">AppleTalk<\/a> and <a title=\"AppleTalk, LocalTalk, and PhoneNet\" href=\"http:\/\/lowendmac.com\/ed\/rosen\/09ar\/appletalk-localtalk.html\" target=\"_blank\" rel=\"noopener noreferrer\">Phonenet<\/a>. I still have a bag of terminators.<\/em>)<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20220803185800\/https:\/\/www.old-computers.com\/museum\/computer.asp?st=1&amp;c=162\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101742\" title=\"Mac 30\/SE\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_mac_se30.jpg?resize=114%2C100&#038;ssl=1\" alt=\"Mac 30\/SE\" width=\"114\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_mac_se30.jpg?resize=150%2C131&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_mac_se30.jpg?resize=75%2C66&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_mac_se30.jpg?w=209&amp;ssl=1 209w\" sizes=\"auto, (max-width: 114px) 100vw, 114px\" \/><\/a>1988 &#8211; <a title=\"HyperCard\" href=\"http:\/\/en.wikipedia.org\/wiki\/HyperCard\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">HyperCard<\/a><\/strong> &#8211; Running on early versions of Apple&#8217;s Mac OS, one HyperCard virus displayed a message about Michael Dukakis&#8217;s US presidential bid before self-destructing:<\/p>\n<p>&#8220;<em>Greetings from the HyperAvenger! I am the first HyperCard virus ever. I was created by a mischievous 14-year-old, and am completely harmless. Dukakis for preseident (sic) in &#8217;88. Peace on earth and have a nice day<\/em>&#8221;<\/p>\n<p><strong>1990 &#8211; The MDEF virus<\/strong> (aka Garfield) emerged, spreading malware on application and system files on the Mac.<\/p>\n<p><strong>1991 &#8211; HC<\/strong> (also known as Two Tunes or Three Tunes) was a HyperCard virus discovered in Holland and Belgium in March 1991. The writes that on German language versions of the operating system it would play German folk tunes and display messages such as &#8220;Hey, what are you doing?&#8221; and &#8220;Don&#8217;t panic.&#8221;<\/p>\n<p><strong><a href=\"https:\/\/office.microsoft.com\/en-gb\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101744\" title=\"Microsoft Office\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Microsoft_office95-e1566679981789-150x131.jpg?resize=109%2C95&#038;ssl=1\" alt=\"Microsoft Office\" width=\"109\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Microsoft_office95-e1566679981789.jpg?resize=150%2C131&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Microsoft_office95-e1566679981789.jpg?resize=75%2C66&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Microsoft_office95-e1566679981789.jpg?w=207&amp;ssl=1 207w\" sizes=\"auto, (max-width: 109px) 100vw, 109px\" \/><\/a>1995 &#8211; Concept Macro Virus<\/strong> &#8211;\u00a0<a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) accidentally shipped the first-ever <a title=\"Macro virus (computing)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Macro_virus_%28computing%29\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Word macro virus<\/a>, Concept, on CD-ROM. It infected both Macs and PCs running Microsoft Word. Concept was not written with malicious intent but thousands of macro viruses were to follow, many also affecting Microsoft Office for Mac. Word macro viruses turned the world of Mac *and* Windows malware on its head overnight according to Sophos.<\/p>\n<p>Macro viruses are written in an easy-to-understand macro language that Microsoft included in its Office programs making it. The blog says the macro language made it child&#8217;s play to create new malware variants. Most people at the time considered documents to be non-dangerous and were happy to receive them without thinking about the security risks. Just opening a Word .DOC file could infect your computer because the macro virus&#8217;s code was embedded within.<\/p>\n<p><strong>1996 &#8211; Laroux<\/strong>\u00a0 Excel macro virus &#8211; The Laroux virus did not affect Mac users until Microsoft released Excel 98 for Mac and then Apple users could also become victims.<\/p>\n<p><strong><a href=\"https:\/\/office.microsoft.com\/en-gb\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101746 size-thumbnail\" title=\"QuickTime logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_quicktime-e1566680062631-75x73.jpg?resize=75%2C73&#038;ssl=1\" alt=\"QuickTime logo\" width=\"75\" height=\"73\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_quicktime-e1566680062631.jpg?resize=75%2C73&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_quicktime-e1566680062631.jpg?resize=150%2C146&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_quicktime-e1566680062631.jpg?w=198&amp;ssl=1 198w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>1998 &#8211; Hong Kong<\/strong> introduced the\u00a0next significant Mac malware outbreak the blog says.\u00a0 It was first spotted in the wild in Hong Kong. The worm &#8211; dubbed AutoStart 9805 &#8211; spread rapidly in the desktop publishing community via removable media, using the CD-ROM AutoPlay feature of QuickTime 2.5+. (<em>rb- An AutoPlay issue &#8211; whoda thunkit?<\/em>). In the same year, Sevendust, also known as 666, infected applications on Apple Mac computers.<\/p>\n<p>After 1988 Mr. Cluely writes that big changes to the Mac malware scene were just around the corner. The release of Mac OS X, a whole new operating system which would mean that much of the old malware would no longer be capable of running. Mac-specific malware would have to be written with a new OS in mind.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.techradar.com\/news\/computing\/apple\/macs-and-malware-how-real-is-the-threat-1083307?src=rss&amp;attr=all\" target=\"_blank\" rel=\"noopener noreferrer\">In Depth: Macs and malware: how real is the threat?<\/a> (techradar.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mac malware is a fact despite how AAPL spins it Sophos says what may surprise some Apple fans is that early Apple viruses predate IBM PC viruses<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,4],"tags":[2197,420,101,380,1289,1291,43,875,1240,1290,782,23,82,421,4],"class_list":["post-10560","post","type-post","status-publish","format-standard","hentry","category-malware","category-security","tag-2197","tag-aapl","tag-apple","tag-elk-cloner","tag-history","tag-hypercard","tag-ibm","tag-mac","tag-mac-os","tag-mac-os-x","tag-macintosh","tag-malware","tag-microsoft","tag-msft","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10560"}],"version-history":[{"count":18,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10560\/revisions"}],"predecessor-version":[{"id":131304,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10560\/revisions\/131304"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}