No offence but is the file safe? not to be rude but this thread is about downloading files from unknown sources and just installing them
That's an Apple site.
No offence but is the file safe? not to be rude but this thread is about downloading files from unknown sources and just installing them
The link I put there was from apple's server swcdn.apple.com and it is easy to verify that this is from apple.
So if you are accusing me of putting a fake link up here, you'll have to do better than that.
You can download the xprotect update here: http://swcdn.apple.com/content/down...5ijzzxg85kb7jxa07/XProtectPlistConfigData.pkg
Well thanks for that. I didn't know there was a new one. I checked it out and found that it applies to mavericks and yosemite. I'm still running mavericks on one of my main computers and the new xprotect didn't install automatically on it. But after confirming that the update does apply to it, I forced it to install by downloading it from the direct link from apple's server at
http://swcdn.apple.com/content/down...rhaa7ka4dzhm8mm1z/XProtectPlistConfigData.pkg
in the hope that it might have included a quarantine for the D variant of iworm. But it didn't!
This raises more questions than it answers. It may not have anything to do with iworm. If that is the case then what is it?
It only changed the minimum FlashPlayer versions to 13.0.0.250 and 15.0.0.189.in the hope that it might have included a quarantine for the D variant of iworm. But it didn't!
This raises more questions than it answers. It may not have anything to do with iworm. If that is the case then what is it?
The previous definitions were based on three files from only two different installers. Who is saying there are three variants?The previous xprotect quarantined variants A, B and C of iworm, but not the D variant. That's why I was interested.
Well, since sample collection is something I do for the benefit of the community (to include submission of them to Apple Product-Security) Im only aware of two true variants and many other files. Apple only deals with things that can be quarantined, so it does not search for any of the additional files that are non-executible deployed files that A-V software vendors incude in their definitions. So when BitDefender, for example, says they have five definitions for iWorm, that doesnt necessarily mean their are five variants.Apple have only quarantined 3 variants - even with this new xprotect. That doesn't mean there ARE only 3 variants. I am convinced a D variant exists and suspect there may be more.
As I said before, the definitions are for an install process that appears to be common to both variants and two different postflight scripts. Ive speculated that one changes the hosts file to block Software Update while the other one does not. In any case all three files appear to come from two different installer apps.Well if there are really only 2 why would apple quarantine 3?
OK. Here it is:
http://swcdn.apple.com/content/down...qau4bm67zk97oilk6/XProtectPlistConfigData.pkg
OSX.Machook.A is the wirelurker blocked by the new xprotect.
You may run these 2 commands in terminal to see if you are infected with wirelurker:
Code:curl -O https://raw.githubusercontent.com/PaloAltoNetworks-BD/WireLurkerDetector/master/WireLurkerDetectorOSX.py
Code:python WireLurkerDetectorOSX.py
It may take a few minutes.
OK. Here it is:
http://swcdn.apple.com/content/down...qau4bm67zk97oilk6/XProtectPlistConfigData.pkg
Do tell us how to find this link for ourselves - ready for the next time....
New xprotect again today:
http://swcdn.apple.com/content/down...9wq3jhdd2c69hnql2/XProtectPlistConfigData.pkg
It protects against OSX.Downlite.A