New Mac malware variant disables OS X defenses

Share this article:
Malware authors have updated a Mac trojan to disable the anti-malware protection Apple has built into its OS X platform, researchers warned this week.

A new variant of the so-called "Flashback" backdoor trojan, dubbed Flashback.C, attempts to disable the automatic updater component of XProtect, the built-in Mac OS X anti-malware application, researchers at anti-virus firm F-Secure said in a blog post Wednesday. Like earlier variants, the malware masquerades as an update to Adobe Flash Player, and to be installed requires users to enter their administrator password.

“Attempting to disable system defenses is a very common tactic for malware — and built-in defenses are naturally going to be the first target on any computing platform,” F-Secure wrote.

Researchers do not know how many users have been infected with the latest variant of Flashback, discovered Monday, but the number is believed to be “very small,” Mikko Hypponen, chief research officer at F-Secure, told SCMagazineUS.com on Wednesday.

The first variant of the malware, Flashback.A, was discovered in late September, and classified as a low-risk threat by Mac security firm Intego. Once installed, the strain connected to a remote server and sent back pilfered information, such as the infected computer's MAC address, a unique identifier.

Last week, researchers discovered a second variant, Flashback.B, which was coded to prevent itself from installing on machines running Mac OS X in a virtualized environment, a technique commonly seen in the Windows world to prevent researchers from analyzing the malware, since many do so using virtual machines.

The latest variant, Flashback.C, now prevents the XProtect anti-malware system from updating itself with security definitions. Apple first introduced XProtect in late 2009, with the release of Snow Leopard (OS X 10.6).

The evolution of the Flashback trojan indicates that its creators are trying to maximize their financial gain, Graham Cluley, senior technology consultant at Sophos, wrote in a blog post Wednesday.

“Clearly, the Mac malware authors are not resting on their laurels,” Cluley wrote. “Maybe if you have a Mac, you shouldn't be too laid back about the genuine threat that exists.”

Despite the risk, the amount of Mac malware is still dwarfed by the number of Windows threats.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.

EU conducts massive cyberattack simulation on critical networks

Conducted by the European Union Agency for Network and Information Security, the simulation launched 2,000 attacks on the networks of various critical infrastructure organizations.

FilmOn accuses DoubleVerify of distributing malware

In readying a libel suit against DoubleVerify, FilmOn says it discovered that the firm deliberately distributed malware.