Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Status
Not open for further replies.
Good find. I tipped the MR blog, gave you credit.

There are trojans out there, but OS X and Linux are still much more secure than Windows. Windows should require an admin password to modify anything in the filesystem.
 
cheers.

yep..also one could say this is Adobe's bug but since PDF reading is built straight into the OSX "preview" app....it's now also an Apple's security issue.

most browsers will open a PDF automatically too..but the installation part of the trojan will probably still prompt for user credentials to get further.
 
It's not a problem with Preview. It's not a PDF at all; it's just a trojan (an .app, probably) that disguises itself as a PDF.

And it's already been added to the OS X Quarantine filter, so OS X will prompt you to delete it if you download it.
 
It's not a problem with Preview. It's not a PDF at all; it's just a trojan (an .app, probably) that disguises itself as a PDF.

And it's already been added to the OS X Quarantine filter, so OS X will prompt you to delete it if you download it.

Shame on Adobe for allowing executable content in a pdf file. It's supposed to be a document format. Shame on Apple if Preview would have allowed infected PDF files to install malware. I don't use Adobe Reader. I have it installed but only use it when a Windows user sends me a pdf with some fonts or equations missing in Preview.

I'm curious to know how Preview would have dealt with this particular threat. Would it have ignored the executable content or were we in danger of having this thing spread before Apple put it in their quarantine list?
 
This is a .app bundle with a PDF icon and .pdf.app extension. It has nothing to do with the PDF file format.
 
Shame on Adobe for allowing executable content in a pdf file. It's supposed to be a document format. Shame on Apple if Preview would have allowed infected PDF files to install malware. I don't use Adobe Reader. I have it installed but only use it when a Windows user sends me a pdf with some fonts or equations missing in Preview.

I'm curious to know how Preview would have dealt with this particular threat. Would it have ignored the executable content or were we in danger of having this thing spread before Apple put it in their quarantine list?

Wow, just wow. This is one of the most pathetic replies I've seen in a while. How come MacRumors has become a place for endless Adobe rants?

I mean, I love Apple and hate Flash too, but come on, it's not the right time to blame everything on Adobe.
 
"When we tested the malware inside our labs, we couldn't manage to get it to execute as the author probably intended," Cluley admits, "however, strings embedded deep inside its code make it clear that it was written with malicious intent."

The message is clear: Apple's success in recent years is coming at a cost, as attackers start to see the company's growing market share as a valuable target for their attentions.

Despite this, it will be quite some time before Mac OS X reaches the heady heights of malware distribution from which its Microsoft-made rival platform suffers"
 
It's not a problem with Preview. It's not a PDF at all; it's just a trojan (an .app, probably) that disguises itself as a PDF.

And it's already been added to the OS X Quarantine filter, so OS X will prompt you to delete it if you download it.

This is absolutely NOTHING new, as even back in 2003 I was affected by a similar disguised file sent by disgruntled script kiddies from another Mac forum...

AGAIN: This is simply an app masked as a PDF file, and not at all a self-replicating virus or anything of the like. As long as you don't have Safari set to open files automatically or, obviously, you DON'T double-click on suspect files, you're fine.
 
Status
Not open for further replies.
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.