Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

New Mac malware variant surfaces, poses as PDF

Sep 26, 2011 | ITNews.com

Mac malware, while not nearly as widespread as the Windows variety, does occasionally appear. Earlier this year we had Mac Defender. Now security research firm F-Secure has announced the discovery of another up-and-coming Trojan horse.

When downloaded, the Trojan-Dropper:OSX/Revir.A puts what appears to be a multi-page Chinese PDF--containing potentially-volatile political opinions--up on your screen. That's just a bit of misdirection, though: if you open the supposed PDF, the Trojan horse installs Backdoor:OSX/Imuler.A. As the name implies, that component opens up a backdoor connection to a remote server.

For now, that's all the Trojan horse does: The server that it connects to is a bare Apache installation that can't do anything to your Mac. In addition, since the strain was discovered via scanning service VirusTotal rather than direct user reports, F-Secure researchers aren't even sure how the Trojan horse is propagating, though their blog post postulates that email attachments are the most likely vector.

As with other bits of Mac malware, the real worry is that this is proof of a concept, a demonstration of what can be done by malware posing as a legitimate file. While alarming, the PDF ruse is nothing new: Windows PCs have endured many ".pdf.exe" extension trojans over the years. If file extensions are hidden, a fake PDF icon could potentially lure unware users into opening something they shouldn't. As Mac security expert Rich Mogull puts it, "It is a lot easier to fool users into installing something than it is to crack the security of the operating system."

So even though Trojan-Dropper:OSX/Revir.A may not pose an immediate danger, it is a reminder that you should stay alert and take sensible precautions in case it--or something like it--morphs into a real threat. We've written in the past about not clicking on links or downloading attachments in email messages from people you don't know, and about unchecking Safari's Open 'Safe' Files After Downloading option (Safari -> Preferences -> General); as long as you practice common sense, you should be safe from most malicious attacks. You should also be sure to keep your OS X malware definitions up to date.

If you do accidentally fall prey to this particular Trojan horse, F-Secure has put up manual instructions for removing the backdoor. To do so, you'll want to open Activity Monitor; select checkvir and click Quit Process; then delete the following files:

/users/user/Library/LaunchAgents/checkvir
/users/user/Library/LaunchAgents/checkvir.plist

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/