New Mac backdoor using antiquated code

Discussion in 'PowerPC Macs' started by Cox Orange, May 8, 2017.

  1. Cox Orange macrumors 68000

    Jan 1, 2010
  2. amagichnich macrumors 6502


    Feb 3, 2017
    Stuttgart, Germany
    I'd say yes, it does affect us :( 'ancient' system calls, pearl and java...
  3. Riku7 macrumors regular

    Feb 18, 2014
    Is that a threat to every computer that has Handbrake installed, or only those who downloaded the app during the mentioned time range?

    Edit:// Actually going back to page 1 of the linked thread...
  4. bobesch macrumors 65816


    Oct 21, 2015
    Kiel, Germany
  5. eyoungren macrumors Core


    Aug 31, 2011
    ten-zero-eleven-zero-zero by zero-two
    If we're talking Anti-Virus: ClamXV for PowerPC

    2.2.1 for Tiger and 2.5.1 for Leopard can be found here:

    Note that I make assumptions that virus definitions would be updated.
  6. thomasareed macrumors member


    Aug 24, 2015
    I didn't see this before, but in short: no, not fully.

    Quimitchin, aka Fruitfly, did include things like perl and Java that would work on PowerPC Macs (although I haven't verified that the particular scripts it uses will function properly on PowerPC). However, one component of the malware was a binary executable file compiled for Intel chips only, and no PowerPC code.

    For that matter, other than some of the malware written entirely in python, I don't think any of the malware that has appeared this year so far would function on a PowerPC Mac. Even the ones written in python would probably not function fully - if at all - on such an old system, as they're written with certain assumptions about the environment they're running in.

    If you're still running a PowerPC Mac, you're pretty safe simply because of the antiquity and rarity of such Macs. There will be no future malware designed to target such Macs, any more than there will be new malware to target the Apple II or the Commodore 64.

Share This Page

5 May 8, 2017