{"id":10920,"date":"2011-11-22T22:50:05","date_gmt":"2011-11-23T02:50:05","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-10-28T17:30:15","modified_gmt":"2021-10-28T21:30:15","slug":"apple-os-x-security-update","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/apple-os-x-security-update\/","title":{"rendered":"Apple OS X Security Update"},"content":{"rendered":"<p><a href=\"http:\/\/www.inquisitr.com\/123197\/hackers-target-apple-security-with-newest-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-101804\" title=\"Apple OS X Security Update\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Apple-Security-Lock-e1566693967291-124x150.jpeg?resize=110%2C133&#038;ssl=1\" alt=\"Apple OS X Security Update\" width=\"110\" height=\"133\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Apple-Security-Lock-e1566693967291.jpeg?resize=124%2C150&amp;ssl=1 124w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Apple-Security-Lock-e1566693967291.jpeg?resize=62%2C75&amp;ssl=1 62w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Apple-Security-Lock-e1566693967291.jpeg?w=143&amp;ssl=1 143w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>The <strong>magical virus-proof Apple<\/strong> operating systems have had a<strong> rough couple of weeks<\/strong>. <a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Apple<\/strong><\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <strong>released security updates<\/strong> for OS X Lion and Snow Leopard, <a title=\"IOS (Apple)\" href=\"http:\/\/www.apple.com\/ios\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iOS<\/a>, <a title=\"Numbers for iOS\" href=\"https:\/\/www.apple.com\/support\/ios\/numbers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Numbers for iOS<\/a>, and <a title=\"Pages for iOS\" href=\"https:\/\/www.apple.com\/support\/ios\/pages\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pages for iOS<\/a>. UK-based security company <a title=\"Sophos\" href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a> <a title=\"nakedsecurity.sophos.com\" href=\"http:\/\/nakedsecurity.sophos.com\/2011\/10\/12\/apple-releases-os-x-10-7-2-and-ios-5-with-enormous-security-patch\/\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> that the <strong>OS X patch addressed 75 known vulnerabilities<\/strong>. Most of the vulnerabilities could lead to arbitrary code execution, while others lead to denial of service or privilege escalation. The bug fix weighs in at a whopping 880MB with recovery download.<\/p>\n<p><a href=\"https:\/\/support.apple.com\/downloads\/#macosandsoftware\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101807\" title=\"Apple OS X Lion\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_macOSXLion.png?resize=75%2C75&#038;ssl=1\" alt=\"Apple OS X Lion\" width=\"75\" height=\"75\" \/><\/a>Next Apple released a <strong>gargantuan <a title=\"Apple\" href=\"https:\/\/support.apple.com\/kb\/HT4981\" target=\"_blank\" rel=\"noopener noreferrer\">update<\/a> to <a title=\"ITunes\" href=\"http:\/\/www.apple.com\/itunes\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iTunes<\/a><\/strong> for Windows that <strong>fixes 79 vulnerabilities<\/strong>. Sophos <a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/10\/11\/itunes-10-5-released-to-fix-79-vulnerabilties-on-windows-os-x-to-follow\/\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that the patch fixes 73 holes that could cause remote code execution in <a title=\"WebKit\" href=\"https:\/\/developer.apple.com\/library\/mac\/#documentation\/InternetWeb\/Conceptual\/WebKit_PluginProgTopic\/WebKitPluginTopics.html\" target=\"_blank\" rel=\"noopener noreferrer\">WebKit<\/a>, used to render HTML content. Other fixes resolve remote code execution bugs.<\/p>\n<p>Despite the huge patches, cyber-criminals have figured out how to disable the rudimentary <strong>anti-virus protection <a title=\"scforum.info\" href=\"http:\/\/scforum.info\/index.php?topic=3144.0\" target=\"_blank\" rel=\"noopener noreferrer\">XProtect<\/a> Apple<\/strong> has built into <a title=\"Mac OS X\" href=\"http:\/\/www.apple.com\/macosx\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Mac OS X<\/a> by enhancing an existing trojan horse <a href=\"http:\/\/www.f-secure.com\/v-descs\/trojan-downloader_osx_flashback_c.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Flashback<\/a>. The <strong>Flashback trojan leaves the Mac vulnerable by preventing XProtect from receiving security definition updates.<\/strong> Sophos makes the point that Mac malware writers are eager to infect <a href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Apple_Inc.\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> computers because of the potential financial rewards.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101809 size-full\" title=\"Sophos logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Sophos_Logo-2.gif?resize=120%2C49&#038;ssl=1\" alt=\"Sophos logo\" width=\"120\" height=\"49\" \/><\/a>The Mac malware authors are not resting on their laurels. Within days, of spotting Flashback in the wild, Sophos <a title=\"nakedsecurity.sophos.com\" href=\"http:\/\/nakedsecurity.sophos.com\/2011\/10\/25\/tsunami-backdoor-trojan-for-mac-os-x-discovered\/\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> that <strong>Tsunami, a new backdoor trojan horse for Mac OS X<\/strong>, had been discovered. Sophos indicates that the new Mac malware may be a port of <a href=\"https:\/\/web.archive.org\/web\/20200805013629\/https:\/\/www.sophos.com\/en-us\/threat-center\/threat-analyses\/viruses-and-spyware\/Troj~Kaiten-Gen\/detailed-analysis.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Kaiten<\/a>, a Linux backdoor Trojan horse that uses an IRC channel for instructions.<\/p>\n<p>Code like this is used to commandeer compromised computers into a DDoS (<a title=\"Distributed denial-of-service\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/distributed-denial-of-service-attack\" target=\"_blank\" rel=\"noopener noreferrer\">distributed denial-of-service<\/a>) attack, flooding a website with traffic. <a title=\"www.eset.com\" href=\"http:\/\/www.eset.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ESET<\/a> <a title=\"blog.eset.com\" href=\"http:\/\/blog.eset.com\/2011\/10\/25\/linux-tsunami-hits-os-x\" target=\"_blank\" rel=\"noopener noreferrer\">notes<\/a> that as well as enabling DDoS attacks, the backdoor can enable a remote user to download files, such as more malware or updates to the Tsunami code.\u00a0 The malware can also execute shell commands, giving it the ability to essentially take control of the affected Mac.<\/p>\n<p><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/10\/25\/tsunami-backdoor-trojan-for-mac-os-x-discovered\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101811\" title=\"Tsunami, a new backdoor trojan horse for Mac OS X\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tsunami-e1566693579898-150x150.jpg?resize=100%2C100&#038;ssl=1\" alt=\"Tsunami, a new backdoor trojan horse for Mac OS X\" width=\"100\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tsunami-e1566693579898.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tsunami-e1566693579898.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tsunami-e1566693579898.jpg?w=170&amp;ssl=1 170w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Only a few more days passed before the <a title=\"www.f-secure.com\" href=\"http:\/\/www.f-secure.com\/v-descs\/backdoor_osx_devilrobber_a.shtml\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>DevilRobber<\/strong><\/a><strong> (<a href=\"https:\/\/web.archive.org\/web\/20201221104010\/https:\/\/www.sophos.com\/en-us\/threat-center\/threat-analyses\/viruses-and-spyware\/OSX~Miner-D\/detailed-analysis.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Miner-D<\/a>) Mac OS X Trojan horse<\/strong> was discovered. DevilRobber was <strong>embedded in hacked versions of Mac OS X<\/strong> image editing app <a title=\"GraphicConverter\" href=\"http:\/\/www.lemkesoft.com\/content\/188\/graphicconverter.html\" target=\"_blank\" rel=\"homepage noopener noreferrer\">GraphicConverter<\/a> version 7.4 distributed <strong>via file-sharing torrent sites<\/strong> such as <a title=\"The Pirate Bay\" href=\"http:\/\/en.wikipedia.org\/wiki\/The_Pirate_Bay\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">PirateBay<\/a>. <strong>Miner-D<\/strong> tries to generate <a title=\"bitcoin.org\" href=\"http:\/\/bitcoin.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bitcoins<\/a>, the currency of the anonymous digital cash system, by stealing lots of GPU (Graphics Processing Unit) time. <a title=\"Graphics processing unit\" href=\"http:\/\/en.wikipedia.org\/wiki\/Graphics_processing_unit\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">GPUs<\/a> are better than regular CPUs at performing the mathematical calculations required for<strong> Bitcoin mining.<\/strong><\/p>\n<p>Sophos reports that in addition to Bitcoin mining, Miner-D also spies on its victim by<strong> taking screen captures a<\/strong>nd stealing usernames and passwords. In addition, it runs a script that copies information to a file called dump.txt regarding <a title=\"www.tuaw.com\" href=\"https:\/\/web.archive.org\/web\/20150131130745\/http:\/\/www.tuaw.com\/2008\/02\/06\/truecrypt-released-for-os-x\/\" target=\"_blank\" rel=\"noopener noreferrer\">truecrypt<\/a> data, <a title=\"www.torproject.org\" href=\"https:\/\/web.archive.org\/web\/20150204190556\/https:\/\/www.torproject.org\/projects\/vidalia.html.en\" target=\"_blank\" rel=\"noopener noreferrer\">Vidalia<\/a> (TOR plugin for Firefox), Safari browsing history, and .bash_history. To complete the assault &#8211; if the malware finds the user&#8217;s Bitcoin wallet it will also steal that.<\/p>\n<p><a href=\"http:\/\/www.ubergizmo.com\/2011\/02\/new-trojan-mac-os-x-windows\/G\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101814\" title=\" DevilRobbe Mac OS X Trojan horse was discovered.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mac-trojan.jpg?resize=117%2C100&#038;ssl=1\" alt=\" DevilRobbe Mac OS X Trojan horse was discovered.\" width=\"117\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mac-trojan.jpg?resize=150%2C128&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mac-trojan.jpg?resize=75%2C64&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mac-trojan.jpg?w=228&amp;ssl=1 228w\" sizes=\"auto, (max-width: 117px) 100vw, 117px\" \/><\/a>DevilRobber was recently been updated <a title=\"www.f-secure.com\" href=\"http:\/\/www.f-secure.com\/weblog\/archives\/00002270.html\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to <a title=\"F-Secure\" href=\"https:\/\/www.f-secure.com\/en\/web\/home_us\/home\" target=\"_blank\" rel=\"noopener noreferrer\">F-Secure<\/a> researchers. F-Secure researchers point out that the newly discovered Trojan is the third iteration of the malware and that it poses as the popular image-editing app PixelMator.<\/p>\n<p><em> Help Net Security<\/em> says this version of DevilRobber has new features that the original version is lacking. It tries to harvest the shell command history, the system log file, and the contents of 1Password, the popular software for managing passwords. Unfortunately, its Bitcoin mining and stealing capabilities are still there, as well.<\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20110430233654\/http:\/\/www.weblo.com:80\/asset_image\/494678\/146813\/HalloweenCostumes.info\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101818 size-medium\" title=\"safe computing.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Selma_Hyak_Sheriff.jpg?resize=77%2C150&#038;ssl=1\" alt=\"safe computing.\" width=\"77\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Selma_Hyak_Sheriff.jpg?resize=77%2C150&amp;ssl=1 77w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Selma_Hyak_Sheriff.jpg?resize=39%2C75&amp;ssl=1 39w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Selma_Hyak_Sheriff.jpg?w=308&amp;ssl=1 308w\" sizes=\"auto, (max-width: 77px) 100vw, 77px\" \/><\/a><em>So despite Apple&#8217;s <a href=\"https:\/\/discussions.apple.com\/thread\/3358460?start=0&amp;tstart=0\" target=\"_blank\" rel=\"noopener noreferrer\">continued<\/a> <a href=\"https:\/\/discussions.apple.com\/thread\/3020470?start=0&amp;tstart=0\" target=\"_blank\" rel=\"noopener noreferrer\">instance<\/a> that their machines <a href=\"https:\/\/forums.macrumors.com\/archive\/index.php\/t-1149361.html\" target=\"_blank\" rel=\"noopener noreferrer\">do not<\/a> <a href=\"https:\/\/web.archive.org\/web\/20230204190828\/https:\/\/appleinsider.com\/articles\/11\/05\/23\/mac_os_x_security_expert_charlie_miller_addresses_mac_defender_malware.html\" target=\"_blank\" rel=\"noopener noreferrer\">need<\/a> anti-malware software, standard malware prevention techniques apply to Macs. Clearly, Mac users like their Windows cousins should <strong>practice safe computing<\/strong>. Some of the safer computing practices for Mac and Windows users include<\/em><\/p>\n<ol>\n<li><em>Never open an email attachment unless you are POSITIVE about the source.<\/em><\/li>\n<li><em>Do NOT click on any pop-up that advertises anti-virus or anti-spyware software especially a program promising to provide every feature known to humanity.<\/em><\/li>\n<li><em>Use an AntiVirus program. A free one is better than none. There are several free versions that work well, like Microsoft Security Essentials which is also free has had good reviews.<\/em><\/li>\n<li><em>Keep your OS and AV updated. Make sure that you install those important updates. An out-of-date antivirus program does not help in detecting new infections.<\/em><\/li>\n<li><em>Use a personal firewall. Use a firewall between your DSL router or cable modem and the computer will protect you from inbound attacks. A software firewall on the computer can protect you from both inbound and outbound attacks.<\/em><\/li>\n<li><em>Do NOT download freeware or shareware unless you have must. These often come bundled with spyware, adware, or fake anti-virus programs. Be especially wary of screensavers, games, browser add-ons, peer-to-peer (P2P) clients, and any downloads claiming to be \u201ccracked\u201d or free versions of expensive applications.<\/em><\/li>\n<li><em>Avoid questionable websites. Some sites may automatically download malicious software onto your computer.<\/em><\/li>\n<li><em>Browse responsibly. Sometimes you might not even have to download and install something but just open a website in your browser for a rogue program to infect your computer. So be careful where you go when you are browsing.<\/em><\/li>\n<li><em>Pay attention to your incoming e-mails. Some of them can contain viruses or content pointing to malicious sites. Don&#8217;t click on links provided by false institutes that invite you to change passwords or similar.<\/em><\/li>\n<li><em>\u201cPhishing\u201d describes scams that attempt to acquire confidential information such as credit card numbers and passwords by sending out e-mails that look like they come from real companies or trusted people. If you happen to receive an e-mail message announcing that your account will be closed, that you need to confirm an order, or that you need to verify your billing information, do not reply to the e-mail or click on any links. If you want to find out whether the e-mail is legitimate, you can go to their website by directly typing their address into your browser or by calling them.<\/em><\/li>\n<\/ol>\n<p><strong>Related articles<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2011\/10\/26\/tsunami_mac_backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tsunami Trojan: First Mac attack based on Linux crack<\/a> (go.theregister.com)<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20111231024507\/http:\/\/www.zdnet.com:80\/blog\/security\/new-mac-os-x-malware-with-ddos-functionality-spotted-in-the-wild\/9701?\" target=\"_blank\" rel=\"noopener noreferrer\">New Mac OS X malware with DDoS functionality spotted in the wild<\/a> (zdnet.com)<\/li>\n<\/ul>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple security has had challenges lately, with a huge updates to OS X iOS and trojans Flashback Kaiten DevilRobber Tsunami for DDoS<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,420,101,857,3336,107,858,1135,611,1240,4,281,1214],"class_list":["post-10920","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-aapl","tag-apple","tag-bitcoin","tag-bitocin-mining","tag-f-secure","tag-graphicconverter","tag-ios","tag-itunes","tag-mac-os","tag-security","tag-sophos","tag-trojan-horse"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10920"}],"version-history":[{"count":27,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10920\/revisions"}],"predecessor-version":[{"id":130950,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10920\/revisions\/130950"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}