Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
The problem, to me, seems to be traditional installers that do all kinds of things behind the user's back. I don't understand why Apple even supports installers anymore. Apple created a brilliant method of software installation with app bundles. Just drag and drop the app to your Applications folders and it's done. I'd always assumed that's where OS X was headed eventually and that installers were on their way out.

...but Flash isn't an "application"... it's a plug-in. I'm personally glad there's an installer to put it in the right location rather than just a plugin file on a .dmg that says "drag me to ~/Library/Internet blah blah blah/" and then restart your browsers"

And then... what about kernel extensions? Drivers? Sorry, but there are plenty of things that need installers.
 
How can I determine if my system has the trojan installed?

If I do already have this trojan installed, will updating OS X remove it, or merely prevent it from being installed if you don't already have it?
 
It's just a text file. Open it with your favorite text editor and delete the unwanted entries.

Yes, I actually went and double checked my kids' Mac mini which I updated Flash on yesterday by simply running "cat /etc/hosts" from a terminal window and looking for any strange entries. All looked good in there, just stuff I added myself last year.

So if you want to check if you stumbled on this trojan just check the contents of the /etc/hosts file.
 
Let's get this out of the way right now : This is not an OS X virus.

A knack of stating the obvious?

So many people fail to realize that viruses are not the thread mainsteam users face these days. The days of thousands of viruses raining on your Windows computers are long over.

Malware like this is the new infestation and it affects all platforms now. It was fun while it lasted on OSX.
 
Let's get this out of the way right now : This is not an OS X virus.

Yes we know or at least I would think most Mac users do. But really how many people don't go to adobe to get their fix or I like to think people are smart enough to know better. :rolleyes:
 
This is sad...
The whole was probably done by apple.
Just to make sure flash/adobe has once more its name attached to some kind of negative crap.
 
...but Flash isn't an "application"... it's a plug-in. I'm personally glad there's an installer to put it in the right location rather than just a plugin file on a .dmg that says "drag me to ~/Library/Internet blah blah blah/" and then restart your browsers"

And then... what about kernel extensions? Drivers? Sorry, but there are plenty of things that need installers.

The list of things that "require" an installer are very small. Apple could have implemented a similar system like what is used for fonts, widgets or control panels where double-clicking the kext, driver file or browser plug-in causes the OS to respond with a "You're trying to use a kernel extension/print driver/plug-in that needs to be moved to blah blah blah..." and then handle it for the user and prompt for an admin password if necessary.

An OS that fully automates installation of files without an installer would have been a thing of beauty. Apple got about halfway there and then never finished the job. I suspect they got sidetracked with the current App Store approach which looks promising but feels like a few steps backward.
 
Wirelessly posted (Mozilla/5.0 (iPod; CPU iPhone OS 5_0 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9A5288d Safari/7534.48.3)

To fix hosts file manually check out this website http://www.f-secure.com/v-descs/trojan_bash_qhost_wb.shtml
 
A knack of stating the obvious?

Yes we know or at least I would think most Mac users do.

Welcome to Macrumors boys. I propose you read a few of these threads (especially the MacDefender threads) where quite a few "Mac users" failed to see the "obvious" there and kept calling it a virus. ;)

There general technical competence of Mac users isn't as high as you'd both hope.
 
Search results on the fake Google pages actually lead to pop-up windows that load external content which was broken at the time of discovery but presumably consisted of advertisements of some sort.

Tisk, tisk. This is just a beta-release of a half baked glorified pop-up window. Not quite ready for prime time, and certainly not a respectable virus.
 
Funny.... I updated Flash yesterday on my kids' Mac mini and I thought that writing a Trojan that masquerades as an update to Flash would be brilliant since Flash is updated so often and getting prompted that you need to update Flash to view a website is very common..... And then today, here it is.
:eek:
Good job then! you made it on Apple's Radar!
 
The public at large...

Let's get this out of the way right now : This is not an OS X virus.

To the vast majority of users out there anything that goes wrong with their computer is caused by a virus. They don't distinguish, let alone understand, the differences between a virus, a worm, a trojan horse, rooting, IP spoofing, etc. If their computer is acting up it's a virus, period, in their mind. No amount of explaining will change that. And it also changes nothing that they allowed the installation of the "virus" themselves. They will never accept responsibility for their own actions... ever! It will always be the computer maker's fault. That's just the way it is and will always be. So we more educated users can either accept this fact and help the less educated users deal with their problems or we can point and laugh at them for their ignorance.
 
How can I determine if my system has the trojan installed?

If I do already have this trojan installed, will updating OS X remove it, or merely prevent it from being installed if you don't already have it?

First question would be have you recently installed or updated Flash? If so did you get the update from Adobe's website? In that case you almost certainly do NOT have this Trojan on your machine.

If you recently installed or updated Flash by responding to a prompt on a website of questionable nature then you MAY have this trojan.

So which is it?
 
yes, it's beginning. mac is not ruled out from malware, virus anymore. it means that mac os X could be vulnerable (even worst than windows 7). in terms of system protection, mac os x is very weak. you should remember it.

Here is my obligatory counter-troll:

Here is a comparison of OS X to Windows:

1) Until Vista, the admin account in Windows did not implement DAC in a way to prevent malware by default. Also, Windows has a far greater number of privilege escalation vulnerabilities that allow bypassing DAC restrictions even if DAC is enabled in Windows.

Much of the ability to turn these vulnerabilities into exploits is due to the insecurity of the Windows registry. Also, more easily being able to link remote exploits to local privilege escalation exploits in Windows is due to the Windows registry.

Mac OS X does not use an exposed monolithic structure, such as the Windows registry, to store system settings. Also, exposed configuration files in OS X do not exert as much influence over associated processes as the registry does in Windows.

Mac OS X Snow Leopard has contained only 2 elevation of privilege vulnerabilities since it was released; obviously, neither of these were used in malware.

http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/ -> guide to develop exploits to bypass UAC by manipulating registry entries for kernel mode driver vulnerabilities.

https://media.blackhat.com/bh-dc-11/Mandt/BlackHat_DC_2011_Mandt_kernelpool-wp.pdf -> more complete documentation about Windows kernel exploitation.

http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k+ -> list of incidences of kernel mode driver vulnerabilities.

http://threatpost.com/en_us/blogs/tdl4-rootkit-now-using-stuxnet-bug-120710 -> article about the TDL-4 botnet which uses a UAC bypass exploit when infecting Windows 7.

2) Windows has the potential to have full ASLR but most software does not fully implement the feature. Most software in Windows has some DLLs (dynamic link libraries = Windows equivalent to dyld) which are not randomized.

http://secunia.com/gfx/pdf/DEP_ASLR_2010_paper.pdf -> article overviewing the issues with ASLR and DEP implementation in Windows.

Also, methods have been found to bypass ASLR in Windows 7.

http://vreugdenhilresearch.nl/Pwn2Own-2010-Windows7-InternetExplorer8.pdf -> article describing bypassing ASLR in Windows 7.

Mac OS X has full ASLR implemented on par with Linux. This includes ASLR with position independent executables (PIE). DLLs in Windows have to be pre-mapped at fixed addresses to avoid conflicts so full PIE is not possible with ASLR in Windows.

3) Mac OS X Lion has DEP on stack and heap for both 64-bit and 32-bit processes. Third party software that is 32-bit may lack this feature until recompiled in Xcode 4 within Lion. Not much software for OS X is still 32-bit.

But, not all software in Windows uses DEP; this includes 64-bit software. See article linked in #2.

4) Mac OS X implements canaries using ProPolice, the same mitigation used in Linux. ProPolice is considered the most thorough implementation of canaries. It is known to be much more effective than the similar system used in Windows.

http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-silberman/bh-us-04-silberman-paper.pdf -> article comparing ProPolice to stack canary implementation in Windows.

5) Application sandboxing and mandatory access controls (MAC) in OS X are the same thing. More specifically, applications are sandboxed in OS X via MAC. Mac OS X uses the TrustedBSD MAC framework, which is a derivative of MAC from SE-Linux. This system is mandatory because it does not rely on inherited permissions. Both mandatorily exposed services (mDNSresponder, netbios...) and many client-side apps (Safari, Preview, TextEdit…) are sandboxed in Lion.

Windows does not have MAC. The system that provides sandboxing in Windows, called mandatory integrity controls (MIC), does not function like MAC because it is not actually mandatory. MIC functions based on inherited permissions so it is essentially an extension of DAC (see #1). If UAC is set with less restrictions or disabled in Windows, then MIC has less restrictions or is disabled.

http://www.exploit-db.com/download_pdf/16031 -> article about Mac sandbox.

http://msdn.microsoft.com/en-us/library/bb648648(v=VS.85).aspx -> MS documentation about MIC.

https://media.blackhat.com/bh-eu-11/Tom_Keetch/BlackHat_EU_2011_Keetch_Sandboxes-Slides.pdf -> researchers have found the MIC in IE is not a security boundary.

6) In relation to DAC and interprocess sandboxing in OS X in comparison with some functionality of MIC in Windows 7 (see #5), the XNU kernel used in OS X has always had more secure interprocess communication (IPC) since the initial release of OS X.

Mac OS X, via being based on Mach and BSD (UNIX foundation), facilitates IPC using mach messages secured using port rights that implement a measure of access controls on that communication. These access controls applied to IPC make it more difficult to migrate injected code from one process to another.

Adding difficulty to transporting injected code across processes reduces the likelihood of linking remote exploits to local exploits to achieve system level access.

As of OS X Lion, the XPC service has also been added to implement MAC (see #5) on IPC in OS X. (http://developer.apple.com/library/...stemStartup/Chapters/CreatingXPCServices.html)

7) Windows has far more public and/or unpatched vulnerabilities than OS X.

http://www.vupen.com/english/zerodays/ -> list of public 0days.

http://www.eeye.com/Resources/Security-Center/Research/Zero-Day-Tracker -> another list of public 0days.

http://m.prnewswire.com/news-releas...-vulnerability-in-microsoft-os-110606584.html -> article about 18 year old UAC bypass vulnerability.

8) Password handling in OS X is much more secure than Windows.

The default account created in Windows does not require a password. The protected storage API in Windows incorporates the users password into the encryption key for items located in protected storage. If no password is set, then the encryption algorithm used is not as strong. Also, no access controls are applied to items within protected storage.

In Mac OS X, the system prompts the user to define a password at setup. This password is incorporated into the encryption keys for items stored in keychain. Access controls are implemented for items within keychain.

Also, Mac OS X uses a salted SHA1 hash, which is still considered cryptographically secure. It is more robust than the MD4 NTLMv2 hash used in Windows 7.

http://www.windowsecurity.com/articles/How-Cracked-Windows-Password-Part1.html -> article about Windows password hashing.
 
First question would be have you recently installed or updated Flash? If so did you get the update from Adobe's website? In that case you almost certainly do NOT have this Trojan on your machine.

If you recently installed or updated Flash by responding to a prompt on a website of questionable nature then you MAY have this trojan.

So which is it?

Well, today, I turned on my computer and Adobe's updated started soon afterwards. I clicked "Install" and the "Agree" window popped up next. I clicked on the software agreement and it took me to Adobe's website. Is that a good sign that I didn't get this trojan?
 
Let's get this out of the way right now : This is not an OS X virus.

Thank you!!!

yes, it's beginning. mac is not ruled out from malware, virus anymore. it means that mac os X could be vulnerable (even worst than windows 7). in terms of system protection, mac os x is very weak. you should remember it.

Not even close. Read Munkery's counter troll post. You also need to look at things such as entry points into the kernel. There are many books out there that will provide plenty of detail on OS exploits. I will say one thing though they all will show you that Windows has far more vulnerabilities than any OS.

Even iOS has had trojan/spyware

No it hasn't. (Maybe jailbroken but not on regular iOS devices).

This is sad...
The whole was probably done by apple.
Just to make sure flash/adobe has once more its name attached to some kind of negative crap.

I really hope you don't believe that silly statement.
 
Is this a sign?

Or just coincidence that in less then half a year two trojans show up in mac land.

Hey at least as Mac users aren't stupid enough to download crap from mysterious sites like how Windows user do. Windows has 100 of viruses. Us Mac have only 2.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.