All the latest UK technology news, reviews and analysis


New Trojan besieging Apple's MacOS

27 Jul 2012
macversuswindows-carousel

Security firm Intego has discovered a new Trojan dropper targeting Apple's Mac operating system that is resilient enough to survive system reboots.

Intego reported finding the OSX/Crisis Trojan which can establish backdoor access to infected machines and installs itself using a stealthy installation process.

The malware reportedly targets Apple's Snow Leopard and Lion operating systems and has built in defences that protect it from reboots - meaning machines will remain infected until the malware is actively removed.

The malware's effect on infected machines depends on the users administrative permissions.

"If the dropper runs on a system with admin permissions, it will drop a rootkit to hide itself. In either case, it creates a number of files and folders to complete its tasks," wrote Intego researcher Lysa Myers.

"The backdoor component calls home every five minutes, awaiting instructions. The file is created in a way that is intended to make reverse engineering tools more difficult to use when analysing the file. This sort of anti-analysis technique is common in Windows malware, but is relatively uncommon for OS X malware."

OSX/Crisis is one of many new cyber attacks to have been discovered targeting Apple's Mac operating system. Prior to OSX/Crisis the Flashback malware was uncovered at the start of 2012. At its peak the malware was believed to have infected over 600,000 systems.

Kaspersky Labs' David Emm recently warned that the number of MacOS attacks will likely increase over the next few years.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
23%
15%
4%
18%
28%
12%

Popular Threads

Powered by Disqus
samsung-galaxy-s5-smartphone

Samsung Galaxy S5 video review

We break down the key strengths and weaknesses of Samsung's latest Android flagship

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

HR Business Partner

HR BUSINESS PARTNER LOCAL AUTHORITY - 1 YEAR FTC HERTFORDSHIRE...

4 x PHP/Zend developer (PHP, Zend, Doctrine, Agile)

4 x PHP/Zend developer (PHP, Zend, Doctrine, Agile...

RISK AND CONTROL ANALYST

RISK AND CONTROL ANALYST Location: Cheshire Salary...

JavaScript Developer (OO JavaScript, HTML5, CSS3) - URGENT

JavaScript Developer (OO JavaScript, HTML5, CSS3...
To send to more than one email address, simply separate each address with a comma.