All the latest UK technology news, reviews and analysis

Cyber criminals to copy MacDefender OS X malware scam in 2012

24 Jan 2012
Apple MacBook Air

The rise of the infamous MacDefender malware in 2011 has set an example cyber criminals are likely to follow in the coming year, according to Mac OS X security specialist Intego.

The firm said that the emergence of MacDefender proved that malware can thrive in a Mac user community not accustomed to dealing with security threats.

First discovered in May, the MacDefender infection menaced users throughout the summer. Posing as a security tool, the infection used phony alert dialogues to convince users to pay a registration fee for the software.

When Apple took steps to isolate and block the infection, the malware was repackaged with workarounds to avoid detection.

Intego spokesman Peter James told V3 that MacDefender showed malware writers that targeting OS X systems was finally worth the time and effort.

Furthermore, the unfamiliarity many Mac users have with the social engineering tactics used by malware writers made them particularly prone to attacks.

"MacDefender made the malware community realise that Macs are a target," James explained.

"Mac users are not used to having these threats, and they don't know how to deal with them."

Social engineering tactics in general are expected to be prevalent in 2012. James noted that the closed nature of iOS and the strict controls of the App Store help keep malicious software from threatening most iPhones and iPads.

Apple's mobile devices, however, remain prone to the web-based phishing and fraud operations that target all desktop and mobile users.

"Phishing works, social engineering works and 419 scams work," he explained. "They all depend on a user's gullibility, and those things are not going to change."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Shaun Nichols

Shaun Nichols is the US correspondent for He has been with the company since 2006, originally joining as a news intern at the site's San Francisco offices.

More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Sony Xperia Z2 smartphone running Android KitKat 4.4

Sony Xperia Z2 video

We test out the latest Android KitKat flagship from Sony

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Java Developers X2 - Oslo

Java, Algorithms, Data Structures, Groovy, Rails, Linux...

Front End Web Developers x2 - Oslo

HTML, CSS (SASS), JavaScript, JQuery, Angular JS, ROR...

Web Developers x3 - work from home

HTML, CSS, JavaScript, PHP/PHP 5, MySQL, LAMP, Subversion...

Front End Web Developers (eCommerce) x3

HTML, CSS, JavaScript, eCommerce Package (Ideally Demandware...
To send to more than one email address, simply separate each address with a comma.