reddit is such a ****** website
No offence, but it's from apple.
Does that make it safe? Unless you ask an iphone 6 or 6+ user with ios 8.0.1 (not to be rude) I'd say yes.
However I'd just reiterate that there may still be a danger since it does not yet address the issue of the osx.iworm.d variant. When (and if) it does, I'll post an updated link.
Okay. Just to be clear here, this is not a virus? A virus is something that can manipulate/alter specific programs and spread itself, whereas a worm can do the same but not limited to specific softwares? So that makes this just another Trojan, and by trojan I mean malware that was somehow authenticated by the user and will collect sensitive information. Bottom line is, OS X is still as secure as it ever was, and non-pirate users have zilch to worry about?
Did I just answer my own question?
Can you recommend a safe pirate site?
<kidding>
Le reddit army unite!!
Anyway, if you install pirated software from shady websites, it's your own fault.
Hm, when I take a look at the Xprotect.plist there are no OSX.iWorm entries.The update applies to yosemite pb4, yosemite gm and for mavericks.
The user Parasprite mentioned xprotect would be updated automatically in the background. So I was wondering. Thanks for the information.That's because you haven't updated it yet. You can get the update in the link I posted earlier: https://forums.macrumors.com/posts/20014686/
I would suggest closing the file before updating it though.
You won't find it in either because the update is via xprotect, which is updated automatically. I know there used to be a way to force an update using a terminal command, but iirc there isn't a way to do this in Mavericks (yet).
Good update - a lot of the "Hey look! Mac malware!" hue and cry has, of course, come from the usual places, namely antivirus software houses - and that hue and cry has not mentioned how the damn thing gets in your Mac in the first place.
That was a glaring omission, and it was right for MacRumors to hold off until now.
I actually don't have an answer to that. However, there is an indirect way to do it. Go to Finder->Go->Go To Folder. Copy this into the box:
/System/Library/CoreServices/CoreTypes.bundle/Contents/Resources/
Scroll to the bottom to a file called "xprotect.meta.plist". The date it was last changed will be the last time it was modified. Mine shows 9/18/14 (I think that was when I installed 10.9.5) but yours may be different. Apple doesn't update it very often so I wouldn't be that surprised if it looks more out-of-date than this. You can check back periodically to see if it gets modified.
What it really sums up, is stupidity and ignorance of the common Apple user.Sums up Reddit really... bunch of tools who are all about trending and thinking they are elite $hizzle when they are really a bunch of kids who love putting double spaces at the end of the line AND HAVING ALL SLEDGING IN CAPITALS.
Can you recommend a safe pirate site?
<kidding>
What it really sums up, is stupidity and ignorance of the common Apple user.
just checking given the topic. looking at the url I can see its from apple now. odd that it hasn't updated automatically , if id not seen this thread id have not even thought to look assuming it auto updated.
I will have to check and see if this update is via the store or the site.
What it really sums up, is stupidity and ignorance of the common Apple user.
However there's a thing that really annoys me when installing software: allowing administrator rights. Ok, let's give administrator rights so the app can copy stuff to some system folders, but since it should not be the standard behavior of any app, why OSX doesn't give a more detailed explanation of what will be done with the root access I'm giving? It could throw that warning popup with a button providing additional details of the operation, don't you agree?
Just curious, has a "good botnet" ever existed? IE, one that automatically and without your knowledge adds you to FOLDING@home or some similar organization? How much computing power is out there that could be used for these projects, but isn't either because the owner doesn't know or the owner doesn't care? How much of it could you trick them into contributing through this?
Not saying someone actually should do this, but it's an interesting idea I've had for awhile.
It has been discovered how the botnet is installed. You have to download a pirated app, such as Photoshop, and then give the pirated installer administrator privileges.
No amount of malware security can fix stupid.
EDIT: Link to evidence: http://www.thesafemac.com/iworm-method-of-infection-found/
How do I check if xprotect is running properly (installed and not disabled) on my Mac? Thanks in advance.
You won't find it in either because the update is via xprotect, which is updated automatically. I know there used to be a way to force an update using a terminal command, but iirc there isn't a way to do this in Mavericks (yet).
So this is a silent "in-the-background" update that Apple pushes to my Internet-connected iMac?