Mac OS X malware used in targeted attacks

By on
Mac OS X malware used in targeted attacks

Targets 'Flashback' Java vulnerability.

Just as the news surrounding the outbreak of the Flashback trojan that infected nearly 650,000 Mac OS X machines began to subside, experts have discovered another threat to the platform.

Security firm Symantec released a report on Friday indicating that a new trojan is targeting the same (now-patched) vulnerability that the Flashback malware took advantage of in Java.

Once the malware, dubbed “Sabpub,” is injected into a user's computer, it has the ability to open a back door that enables miscreants to send commands to the infected computer, including taking screenshots, downloading files or installing additional malware.

Symantec classified the infection as a “very low” risk trojan and research conducted over the weekend by Russian-based Kaspersky Lab may indicate why the threat level is not comparable to that of Flashback.

According to a blog post Saturday by Costin Raiu, director of Kaspersky Lab's global research and analysis team, Sabpub is designed for use in “targeted attacks.”

“At the moment, it is not clear how users [were] infected with this, but the low number and its back door functionality indicates that it is most likely used in targeted attacks,” he wrote.

Raiu reported that the IP address of the command-and-control (C&C) server which hosts Sabpub is shared with that of a previous attack, known as “Luckycat,” discovered by Kaskersky in March. That was an advanced persistent threat (APT) campaign targeting Tibetan activists.

“The IP address of the C&C to which this bot connects (199.192.152) was also used in other Windows malware samples during 2011, which made us believe we were looking at the same entity behind these attacks,” Raiu wrote.

Further, a separate blog post on Sunday revealed that there are at least two variants of Sabpub in the wild: one which attacks the vulnerability in Java, and another that focuses on an older vulnerability in Microsoft Word for OS X.

“The Word documents exploited a vulnerability in Microsoft Word (including Microsoft Office for Mac), to install an older version of the malware,” Seculert CTO Aviv Raff said. “These seem to be the method of operation used by the attackers before they started using the Java exploits.

Kaspersky Lab senior researcher Roel Schouwenberg suspected the attacks occurred through infected websites and via phishing emails.

Flashback infected computers through drive-by downloads that results in greater infection numbers. Although Sabpub used the same Java vulnerability, the malware was spread via targeted spam messages, leading experts like Schouwenberg to say infection numbers could be fewer than 100.

“People definitely need to make sure their software is up to date, just like with Windows,” Schouwenberg said. “So that's not just OS X, but also Java and Office. Obviously, running security software will help.”

A spokesperson for Apple could not be reached for comment.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition
Tags:

Most Read Articles

You must be a registered member of iTnews to post a comment.
| Register

Poll

New Windows 10 users, are you upgrading from...
Windows 8
Windows 7
Windows XP
Another operating system
Windows Vista
How should the costs of Australia's piracy scheme be split?
Rights holders should foot the whole bill
50/50
ISPs should foot the whole bill
Government should chip in a bit
Other
View poll archive

Whitepapers from our sponsors

What will the stadium of the future look like?
What will the stadium of the future look like?
New technology adoption is pushing enterprise networks to breaking point
New technology adoption is pushing enterprise networks to breaking point
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
The next era of business continuity: Are you ready for an always-on world?
The next era of business continuity: Are you ready for an always-on world?

Log In

Username:
Password:
|  Forgot your password?