Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security OS X Operating Systems Software

Trojan Hides In Pirated Copies of Apple iWork '09 431

CWmike writes "Pirated copies of Apple's new iWork '09 suite that are now available on file-sharing sites contain a Trojan horse that hijacks Macs and leaves them open to further attack, a security company said yesterday. The 'iServices.a' Trojan hitchhikes on iWork '09's installer, said Intego, which makes Mac security software. 'The installer for the Trojan horse is launched as soon as a user begins the installation of iWork, following the installer's request of an administrator password,' Intego said in a warning. Once installed, the Trojan "phones home" to a malicious server to notify the hacker that the Mac has been compromised, and to await instructions."
This discussion has been archived. No new comments can be posted.

Trojan Hides In Pirated Copies of Apple iWork '09

Comments Filter:
  • Of course (Score:5, Insightful)

    by ColdWetDog ( 752185 ) * on Thursday January 22, 2009 @11:43PM (#26570085) Homepage

    About Intego

    Intego develops and sells desktop Internet security and privacy software for Macintosh.

  • cynicism (Score:5, Insightful)

    by bwthomas ( 796211 ) <bwthomas&gmail,com> on Thursday January 22, 2009 @11:45PM (#26570107)

    Sometimes I wonder if companies that create security software aren't sometimes guilty of either creating or funding the creation of viruses, trojans, worms, &c. simply to justify their own existence.

    Is that cynical?

  • by Dreadneck ( 982170 ) on Thursday January 22, 2009 @11:49PM (#26570145)
    Since when does a PEBKAC error count as news? If you're idiot enough to install pirated software then you deserve what you get - and absolutely nobody can protect a computer system against user stupidity.
  • Re: But, but.... (Score:4, Insightful)

    by JPortal ( 857107 ) <joshua...gross@@@gmail...com> on Thursday January 22, 2009 @11:49PM (#26570147) Homepage

    This requires user action and piracy. No one can -ever- claim that -any- computer is safe from, essentially, social engineering.

  • by JoshuaZ ( 1134087 ) on Thursday January 22, 2009 @11:50PM (#26570157) Homepage
    If Apple were evil they could deliberately put hacked versions onto filesharing sites. More seriously, this is a good example of why even pirating software is really not a good idea. Unless you know exactly who you are downloading from you don't know what you are getting. Very little commercial software has nice little checksums or hashes that are easily available for you to verify. Downloading pirated software is a bit like having unprotected sex with a stranger. It might feel real good now, but you are going to regret it later.
  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Thursday January 22, 2009 @11:58PM (#26570239)
    Comment removed based on user account deletion
  • by DurendalMac ( 736637 ) on Friday January 23, 2009 @12:02AM (#26570261)
    I don't think anyone would blame Microsoft for user-installed malware. It's when you get something simply by going to a website, clicking a link, mounting a drive, or even just hooking it up to the internet that can be blamed on lousy code. When malicious nasties get onto OS X by any of the above with no real action on the user's part, then you we can all blame Apple just like we blamed Microsoft. Until then, it's just a PEBKAC issue.
  • Re: But, but.... (Score:5, Insightful)

    by vux984 ( 928602 ) on Friday January 23, 2009 @12:05AM (#26570283)

    This requires user action and piracy.

    So does 99.99% of windows malware.

    No one can -ever- claim that -any- computer is safe from, essentially, social engineering.

    Again right. But what's the solution? That is the real question.

    Because this is the ecosystem microsoft lives in, we've seen what they're trying... digital signatures on drivers, the inability to put admin items in your startup, UAC prompts... etc, etc.

    What is Apple going to do in response to inevitable arrival of social-engineering malware as it gains marketshare?
    What is Linux going to if/when it acheives enough marketshare among joe-sixpacks for social engineering to be profitable?

    As much as /. likes to take shots at Microsoft, what would you do better? *nix security is just as vulnerable to social engineering as windows is, given the same users.

  • Re:cynicism (Score:5, Insightful)

    by zappepcs ( 820751 ) on Friday January 23, 2009 @12:08AM (#26570307) Journal

    They certainly use virus news to justify their existence and the cost of their products. The fact that they exist is tantamount to admitting that no OS can be fully secured.

    The harder anti-virus vendors bleat on about how good their product is, the more bragging rights a virus writer will get for walking around the security... among their own crowd. It's more or less a case of putting up a wall and telling the world, there, you can't get past this wall now.

    The real trouble with anti-virus vendors is that they tend to convince people that once their product is installed, the end user's pc is safe. It is NOT, and won't ever be. Some of the best virus programs in the world are still out in the wild, running as they were intended to run, collecting and passing information as they are supposed to. Since they are not destructive to normal computer activity, they go undetected. Don't say that such does not exist... I know you have not done forensics on all existent computers. Every now and then we hear about some corporate espionage or attacks from state military groups etc. All of this is just hinting at the real problems: The virus programs we don't know about.

    Think about it. If a virus program did some key logging for bank URLs then spread itself a bit, then self destructed... hmmmmm They are seeing more sophisticated virus programs now, and fortunately beginning to look for them. Sadly, you'll have some pretty incredibly long scan times to find some types of malicious software: none of this 45 minute scan by Symantec etc.

    Soon, you'll need a multicore CPU just to handle real time scanning. It's a giant whack-a-mole game. Always will be.

  • Re:Of course (Score:4, Insightful)

    by calmofthestorm ( 1344385 ) on Friday January 23, 2009 @12:08AM (#26570311)

    It's especially nice if such monitoring software is not "on the radar" of malware sites, since they could include a workaround for such software, as is frequently done for Norton and Symantic on Windows.

  • by Dreadneck ( 982170 ) on Friday January 23, 2009 @12:12AM (#26570335)
    From the article:

    The installer for the Trojan horse is launched as soon as a user begins the installation of iWork, following the installer's request of an administrator password

    As I said, it's a PEBKAC error. If you give an installer your admnin password it can do whatever it pleases. Only an idiot installs pirated wares and only a supremely stupid idiot gives said warez the root password. No security paradigm will ever be invented that cannot be undermined by human stupidity.

  • And how long has it been since a true virus was attacking windows?

    Just this week. [nytimes.com]

    It's always trojans, worms or adware and has been for several years.

    A worm differs from a virus only in so much that it doesn't need to copy itself into a system program. For all intents and purposes however, the difference between the two terms is antiquated.

  • by 99BottlesOfBeerInMyF ( 813746 ) on Friday January 23, 2009 @12:33AM (#26570515)

    As I said, it's a PEBKAC error. If you give an installer your admnin password it can do whatever it pleases.

    And if you read my post, I'm telling you that is a design flaw in the OS. On a well designed OS, the software has more granularity of permission than "can do everything include connect to random servers" and "can't install". Apple seems to agree with me since they added an ACL framework to restrict applications with a finer level of permissions in the last version, although it is only used for a small subset of applications so far.

    Only an idiot installs pirated wares and only a supremely stupid idiot gives said warez the root password.

    I think installing pirated software is unethical and risky, but not necessarily stupid. As for giving it the root password, users have to give up their password all the time to install software, which is part of the problem.

    No security paradigm will ever be invented that cannot be undermined by human stupidity.

    Maybe, maybe not, but you can sure do a heck of a lot more than current, mainstream OS's do now to help users avoid such security threats.

  • Re: But, but.... (Score:3, Insightful)

    by Anthony_Cargile ( 1336739 ) on Friday January 23, 2009 @12:38AM (#26570553) Homepage

    So does 99.99% of windows malware.

    Somehow I doubt that Windows worms and exploits only make up .001% of all Windows malware. The old lsass exploit (yeah, I know you remember) was pretty widespread and only required an internet connection and an unpatched Windows 2000/maybe XP machine. ...But it was only a part of the .001% of non-user interactive malware that your statistics seem to assert.

  • Re:Of course (Score:5, Insightful)

    by ColdWetDog ( 752185 ) * on Friday January 23, 2009 @12:40AM (#26570569) Homepage

    (stares at the Macbook touchpad)

    You got two fingers [macosxhints.com]? (If not, sorry, I'm an insensitive clod.)

  • Re: But, but.... (Score:4, Insightful)

    by Doctor_Jest ( 688315 ) on Friday January 23, 2009 @12:59AM (#26570683)
    They don't encourage users NOT to install... they simply don't hawk the virus software as a crutch to avoid good common sense. That's not to say that Windows (or more specifically Microsoft) does, it's just the nature of the OS itself that dictates what might be vs. what might not be.

    You can safely say that, out of the box, Apple's OS is safer than Microsoft's (and you can make up your own reasons why), and this particular "virus" (it's a trojan, not a virus) isn't related to a vulnerability in the OS. It's related to a vulnerability in a trusting user. It's vastly different than an exploit that antivirus programs are designed to watch for. No antivirus would protect someone from this, unless it was known already as a trojan (then an update would have to show up, etc.) But you begin to see the fallacy of blaming Apple for social engineering. Educating the novices of ANY OS is something we should be doing, rather than trying to have a pissing contest between Jobs and Ballmer.
  • How is this news? (Score:2, Insightful)

    by mysidia ( 191772 ) on Friday January 23, 2009 @01:04AM (#26570707)

    Software programs downloaded from third-party pirate sites can contain trojans.

    Film at 11!

    It's not like trojans are unusual, they are commonplace, and a risk for every computer user who thinks about running things from untrusted sources.

  • by Em Ellel ( 523581 ) on Friday January 23, 2009 @01:05AM (#26570721)

    Note to keygen creators: I do not want to hear your brother's crappy techno remixes when using your app. Is there some way I can pay you to disable this feature?

    Erm, you can indeed. You can pay money to buy a legit serial number - voila - no crappy techno music.

    -Em

  • by Anonymous Coward on Friday January 23, 2009 @01:13AM (#26570789)

    Go learn about the difference between a virus and a trojan.

  • Re:Of course (Score:1, Insightful)

    by Anonymous Coward on Friday January 23, 2009 @01:29AM (#26570895)

    Don't worry too much Cargile you'll figure out the right click eventually. That feature has only been available for the Mac since pre OS X.

    With the Admin password, it is easy to kill "Little Snitch" and I would trust entering an Admin password for an Apple app. But if you are bootlegging then you are just looking for it.

  • by Anonymous Coward on Friday January 23, 2009 @02:06AM (#26571053)

    complete with virii and rootkits.

    Argh. Please don't say "virii", even ironically. It encourages idiots.

  • Pirates (Score:5, Insightful)

    by shmlco ( 594907 ) on Friday January 23, 2009 @02:40AM (#26571247) Homepage

    Not to troll, but as far as I'm concerned anyone who pirates software deserves it...

  • by nawcom ( 941663 ) on Friday January 23, 2009 @02:49AM (#26571293) Homepage

    I am using Ubuntu and pretty sure this kind of trojan wouldn't work! Mac has a pretty "case" with nice looking silver color but I don't think the OS and software parts are good enough, so Mac is not my cup of tea.

    This requires someone to install. you can easily receive a trojan via a .run script or installer binary for commercial or closed source software without knowing. it only requires root access, which you grant when you install the software. think of the vmware workstation installer. this is no different from any unix based OS. I can't believe you think Ubuntu is any more protected. Learn a little.

  • by jo_ham ( 604554 ) <joham999@noSpaM.gmail.com> on Friday January 23, 2009 @03:18AM (#26571469)

    Is this a virus?

    Didn't think so.

    This is social engineering at its finest - an untrusted source, launching executable code (via user action) and gaining elevated privileges (via user input of password).

    Welcome to any operating system's severe vulnerability to attack.

    Still no viruses on OS X though, beyond that proof of concept thing a while back. Still, 1 versus.... how many on Windows? So many you *require* a dedicated third party app to bog down your system and act as doctor, surgeon and nurse to keep the machine clean?

    I'll take OS X thanks.

    Also, don't steal software. You're just asking for trouble. This isn't the first time that OS X has been targeted with dodgy copies of software from download sites - I seem to remember an app that claimed to be the MS Office for Mac installer that did nothing except delete the contents of your home folder.

    Moral of the story again: Untrusted code could do anything. Don't download copied software.

  • by jo_ham ( 604554 ) <joham999@noSpaM.gmail.com> on Friday January 23, 2009 @03:25AM (#26571517)

    Perhaps, but then they will get what's coming to them - they take the risk by getting their software from shady sites.

    There's a much higher percentage of Mac users who *do* pay for their software though, so this just won't affect them.

    It's only $80 or something for iWork. If you really need it, you can afford to buy it (and don;t give me that "some people are so poor" crap - if you can buy a computer, you can budget for the software to run on it).

  • Re: But, but.... (Score:3, Insightful)

    by cliffski ( 65094 ) on Friday January 23, 2009 @04:46AM (#26571929) Homepage

    I'm part of teh evil content industry. If one of my games wrecks your PC, you can sue me. You can track me down easily from my registered company name and bring court proceedings for damages.
    Now try doing that to an anonymous cracker from eastern Europe.

    The fact that I know I am legally responsible for the software I sell means I make damn sure there is nothing dodgy in it. This is the opposite incentive for pirates.

    An example might be the cracked copy of Democracy 2. It crashes when you win the election apparently This isn't in the full version, and is likely a side effect of their crack. What else their crack does I would not like to speculate on, but I sure as hell don't think it's worth risking that they are trustworthy guys to save myself twenty bucks.

  • by krischik ( 781389 ) <krischik&users,sourceforge,net> on Friday January 23, 2009 @05:07AM (#26572023) Homepage Journal

    I just wish someone would do this for the Linux world. I've tried nearly every ISO download under "Applications -> Unix" on The Pirate Bay, but everything seems to be *legal*.

    Why then does OpenOffice.org tell us not to use version which are not from there very own server? Legal does not mean free of malware ad-ons.

    The truth is: OpenSource makes is easier to attach malware to a download.

    Note that I am all in favour of OpenSource - but one should not close his / her eyes from the downside.

  • by jo_ham ( 604554 ) <joham999@noSpaM.gmail.com> on Friday January 23, 2009 @06:05AM (#26572309)

    That was exactly my point. It's a trojan that relies on social engineering to defeat system security, and that's not unique to any one operating system, Windows, Mac or even your favourite flavour of Linux if you're in the market of using dodgy packages.

    I didn't mention anything about porn or music.

  • by Shadowmist ( 57488 ) on Friday January 23, 2009 @07:58AM (#26572787)
    The installation of this virus still requires the user to authorise it to do so by entering an admin password. It's far different than many Windows worms which can infect simply by the built-in autorun feature of windows which will feed a worm into your machine as soon as you stick in a USB or floppy inside your box. Macs do have protections from viruses that Windows does not, but like any protection, if you give the vampire entrance, it's all over.
  • by aplusjimages ( 939458 ) on Friday January 23, 2009 @08:06AM (#26572833) Journal

    So many you *require* a dedicated third party app

    What? Let me fix that for you.

    So many you *require* a dedicated third party apps

    That's more like it.

  • by prospectofdeath ( 934779 ) on Friday January 23, 2009 @09:52AM (#26573717)

    Yes, you could make a "Vubuntu - Ubuntu with Virus edition". But then, how do you get people to download it ?

    If you said it protected your bittorrenting from 'The Man' or hid your porn from your mom someone would download it.

  • by rdnetto ( 955205 ) on Friday January 23, 2009 @10:59AM (#26574483)

    How exactly would they get these offers? If one company can locate them, then so can the others, including the ones interested in suing them.
    Besides, I sincerely doubt that anyone would waste their time breaking into someone else's account just so that they could upload an infected torrent that would be removed within the hour.
    Finally, there are the comments - people will warn you if the torrent is infected.

  • by Anonymous Coward on Friday January 23, 2009 @11:49AM (#26575083)

    Mac users who want a given program are MUCH more likely to actually PAY for their software than those too cheap to buy a decent quality computer.

    As opposed to non-Mac users, who are MUCH more likely to actually find FREE (or CHEAP) alternatives than those too stupid to buy a decent quality computer without overpaying out the wazoo.

  • by clone53421 ( 1310749 ) on Friday January 23, 2009 @11:57AM (#26575197) Journal

    I don't. And I don't plan on pirating it, either. Perhaps you high-powered graphics designers need the full-blown Photoshop, but I'm fine with GIMP.

    (No, I don't want to start a GIMP-vs-Photoshop flame war. I fully realise that some people won't accept GIMP as a substitute, either because they've already paid for and learned Photoshop or because they're one of the rare people – graphics designers or what-have-you – who needs certain features that GIMP doesn't support. I'm just pointing out that probably most average people, like myself, can manage just fine with GIMP, so why go the illegal route?)

  • by gad_zuki! ( 70830 ) on Friday January 23, 2009 @12:15PM (#26575457)

    >This is social engineering at its finest - an untrusted source, launching executable code (via user action

    Thats what a trojan is. Its a program claiming to be one thing but is another.

    That exactly how all the Windows botnets have been built. People downloading fake codecs, fake flash installers, fake AVs, torrented malware, etc. Granted, there are more viruses and worms for windows, but most, if not 90%, of windows infections come from the same exact method that happened here. A windows user installing malware. I cant remember the last time I had to real with a real virus. Everything is a trojan horse now.

    Still no viruses on OS X though, beyond that proof of concept thing a while back

    OSX is 100% as vulernable as Windows in this regard. Now that OSX machines have large numbers expect more of this. Innocence is over. If this keeps up you will be running an AV. It will be irresponsible of you not to.

    Also, don't steal software. You're just asking for trouble.

    Hahaahahaha. Thats what we've been telling windows users for years. They still visit mininova and install "Nero8-cracked" and wonder why their machine is a mess.

  • by Anonymous Coward on Friday January 23, 2009 @03:46PM (#26579371)

    no, no, no. Virii in Linux world work on the honor system. You randomly delete a dozen of your files and mail the virus on to everyone in your address book.

    More likely it would be fully automated, however it would be delivered as a source tarball, and you'd have to un-tar it, change some file permissions, configure it, compile it, install it, and write a script to start it on boot.

    Of course, the first time it runs it would fail, and you'd have to examine the log file, post the error message on a forum, wade through the "RTFM" responses to find a helpful one, use the helpful response to tweak a config file in /etc/virii, and then you're off.

  • Re:Pirates (Score:2, Insightful)

    by citylivin ( 1250770 ) on Friday January 23, 2009 @05:37PM (#26581301)

    So I assume you would be in favour of trojaned pirated mp3s deleting your music collection?

    There are no "ethical" virus writers. Do not pretend this was done as some sort of moralistic point. They are building botnets, and that is wrong.
    Period.

  • by Anonymous Coward on Friday January 23, 2009 @09:57PM (#26584435)

    That was exactly my point. It's a trojan that relies on social engineering to defeat system security, and that's not unique to any one operating system, Windows, Mac or even your favourite flavour of Linux if you're in the market of using dodgy packages.

    I didn't mention anything about porn or music.

    Packages? What about all the random source blobs on the net? Those are usually trusted, and complex enough to hide anything you wanted. A nice juicy OSS Windows Media codec, an Exchange plugin, cool utility, whatever. Beauty of it is trojaning a build system is so much easier to do than an actual app. Although, you could crap out absolutely anything on the other end, and just fail in some obscure way. A hideous GUI slapped together in a few minutes will blend right in with real OSS, so will a broken CLI app.

    How often to OSS users compile crap and shrug when the build system breaks. Or just give up when the product fails to work. That's gold to a trojan author.

    It comes down to trust, and the Linux community already has a LOT of it. Imagine if it becomes more mainstream, and you have to deal with the type of users that think "Free IM icons.exe" is a good idea.

    PS

    Don't BS me with 'but, the trojan will be restricted to my home directory', because it could add "~/.mozilla/bin" to your PATH in the blink of an eye (or some evil aliases in your profile), and I'll put money down on you running a trojaned sudo or gksu before discovering what happened. It's all about trust.

"When the going gets tough, the tough get empirical." -- Jon Carroll

Working...