A Mac OS X attack that leaves no trace

Discussion in 'macOS' started by Habakuk, Jan 25, 2009.

  1. Habakuk macrumors 6502a

    Joined:
    Jul 10, 2007
    Location:
    Vienna Austria Europe
    #1
    http://www.heise-online.co.uk/security/A-Mac-OS-X-attack-that-leaves-no-trace--/news/112481

     
  2. Theophany macrumors 6502

    Theophany

    Joined:
    Nov 16, 2008
    Location:
    NW London.
  3. synagence macrumors 6502a

    Joined:
    Jul 23, 2008
    #3
    Hopefully he's presented his findings to apple 1st though so they can mitigate this threat
     
  4. Riemann Zeta macrumors 6502a

    Joined:
    Feb 12, 2008
    #4
    Wouldn't this cease to be viable the second after one rebooted their machine? If not, it must be one hell of an attack, somehow getting around the volatility of RAM.
     
  5. ppc750fx macrumors 65816

    Joined:
    Aug 20, 2008
    #5
    Holy crap -- you mean he's found a way to run code in RAM only?!? Wow! That's... uh... pretty normal actually. In fact, that's what most exploits for most platforms do. Pretty much any buffer overrun can be used to do the exact same thing as this "revolutionary", "new" technique.

    This reeks of the sort of sensationalism and half-assed reporting that we've seen in recent years. Kinda like whenever Intego notices a dip in their sales and decides to write a puff piece on the latest trojan, this article is just junk meant to scare you and make you take notice of a person/company with an axe to grind. Ignore it, and stop doing their PR for them.
     

Share This Page