After seeing at least two posters refer to this as a "virus", I'm sitting here doing a face palm. One more "it's a virus" comment and I'm moving up to the double face palm...
Bigger, most Windows PC have anti-virus, can you say the same for Macs?
Mac OS X fanboys really need to stop clinging to the mentality that "viruses" don't exist for OS X
haven't seen this malware first hand, but a zip file can be made with absolute paths, making "unzipping" the file put everything where it needs to be to start up automatically on next log in/reboot.
Who's the brainiac who made zip files "safe" ?
Please, enlighten us how "Unix Security" is protecting you here, more than it would on Windows ? I'd be delighted to hear your explanation.
A lot of people trumpet "Unix Security" without even understanding what it means.
Why, do you have proof of a virus for OS X ? Because if you do, let's see it.
Users are of course reminded that day-to-day system usage with standard accounts rather than administrator ones, as well as unchecking the Safari option for automatically opening "safe" files, are two of the simplest ways users can enhance their online security, adding extra layers of confirmation and passwords in the way of anything being installed on their systems.
The Unix Permission system, how a virus on Windows can just access your system and non-owned files, where Unix/Linux dosen't like that.
This is exactly the kind of ignorance I'm referring to. The vast majority of users don't differentiate between "virus", "trojan", "phishing e-mail", or any other terminology when they are actually referring to malware as "anything I don't want on my machine." By continuously bringing up inane points like the above, not only are you not helping the situation, you're perpetuating a useless mentality in order to prove your mastery of vocabulary.
Congratulations.
This is exactly the kind of ignorance I'm referring to. The vast majority of users don't differentiate between "virus", "trojan", "phishing e-mail", or any other terminology when they are actually referring to malware as "anything I don't want on my machine." By continuously bringing up inane points like the above, not only are you not helping the situation, you're perpetuating a useless mentality in order to prove your mastery of vocabulary.
Congratulations.
scoobydoo99 said:Users are of course reminded that day-to-day system usage with standard accounts rather than administrator ones, as well as unchecking the Safari option for automatically opening "safe" files, are two of the simplest ways users can enhance their online security, adding extra layers of confirmation and passwords in the way of anything being installed on their systems.
um, NO THANKS. why in the world would i add "extra layers of confirmation" to my OS X experience?!?! If I wanted nag windows, I'd use Windows!
Archive Utility will not extract these type of ZIP files to their system paths. I believe it will force the use of relative paths. I really doubt any reports that this malware can be installed without user interaction.
Mac OS X fanboys really need to stop clinging to the mentality that "viruses" don't exist for OS X
MisterMe said:WOW! Malware that requires the user to do a Google search, then download, and install. For all of this, it asks for your credit card number.
How can we ever defend our computers against such a diabolical threat?!
This is exactly the kind of ignorance I'm referring to. The vast majority of users don't differentiate between "virus", "trojan", "phishing e-mail", or any other terminology when they are actually referring to malware as "anything I don't want on my machine." By continuously bringing up inane points like the above, not only are you not helping the situation, you're perpetuating a useless mentality in order to prove your mastery of vocabulary.
Congratulations.
To the end user it makes no difference. It's fine if you know, but to a novice quickly correcting them on the difference between a virus, a trojan, or whatever else contributes approximately zero percent towards solving the problem.The fact is, understanding the proper terminology and different payloads and impacts of the different types of malware prevents unnecessary panic and promotes a proper security strategy.
I'd say a social engineering attack is worse than a virus, because social engineering attacks succeed far more often than viruses do. Glass is half full.I'd say it's people that try to just lump all malware together in the same category, making a trojan that relies on social engineering sound as bad as a self-replicating worm that spreads using a remote execution/privilege escalation bug that are quite ignorant of general computer security.
I have no idea how this is relevant to anything I've brought up. "I agree."Really? If they cannot differentiate b/w viruses, they have no right to comment on them. There's some basic education involved in dealing with such things.
If you cannot differentiate b/w a guest and an intruder, it's not my fault.
To the end user it makes no difference. It's fine if you know, but to a novice quickly correcting them on the difference between a virus, a trojan, or whatever else contributes approximately zero percent towards solving the problem.
I'd say a social engineering attack is worse than a virus, because social engineering attacks succeed far more often than viruses do. Glass is half full.
I have no idea how this is relevant to anything I've brought up. "I agree."
The vast majority of users don't differentiate between "virus", "trojan", "phishing e-mail", or any other terminology when they are actually referring to malware as "anything I don't want on my machine.
It is safer to run under an administrator account all the time in OS X than in Windows. On Windows, the administrator is almost the equivalent to the root account on *nixes and as such has unrestricted access to any and all files on the system.
On OS X and other *nix systems, however, the administrator account still can't do all that much without entering the root password. Admin accounts can't touch anything in the System folder. About the worst malware can do, even under an admin account in OS X, is one of the following:
1) Install itself in your user account Library folder
2) Install itself in the system's secondary Library folder (/Library/)
In both cases, the offending executables/libraries/whatever are easily removed - In the case of #1, create a new account and copy your old stuff over. In the case of #2, check the startup folder within, perhaps frameworks in some cases (though I have never seen malware that makes use of the OS X framework system) and delete the malware files. The files and folders contained in the Library folder are all nicely, neatly labeled and any malware should stick out like a sore thumb - it can't hide as something like EXPLORE32.EXE.
Is your info from like 1993 ? Because this little known version of Windows dubbed "New Technology" or NT for short brought along something called the NTFS (New Technology File System) that has... *drumroll* ACLs and strict permissions with inheritance...
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
And I say this as a Unix systems administrator/fanboy. The multi-user paradigm that is "Unix security" came to Windows more than 18 years ago. It came to consumer versions of Windows about 9 years ago if you don't count Windows 2000 as a consumer version.
Wait, knowledge is ignorance ? 1984 much ?
The fact is, understanding the proper terminology and different payloads and impacts of the different types of malware prevents unnecessary panic and promotes a proper security strategy.
I'd say it's people that try to just lump all malware together in the same category, making a trojan that relies on social engineering sound as bad as a self-replicating worm that spreads using a remote execution/privilege escalation bug that are quite ignorant of general computer security.