2014-06-11

Many frustrated PC users have turned to Mac computers after falling victim to malware attacks. In fact, you may have heard many Mac disciples say, “Mac computers never get viruses.” Although a Mac is a terrific product, it isn’t invulnerable to malware. Attackers are creating more and more malware packages designed to target Mac computers.

Mac has a smaller market share than PC, largely because Apple products are more expensive. Hackers choose to target PCs because they can cause more damage with less effort. However, an effective antivirus for Mac software product is still necessary to protect Mac users against malware. As Apple’s market share increases, so will the number of attacks targeted at Macs. Here are 10 Mac viruses from the three years and why Mac users should order a good antivirus program now.

BlackHole (2011)

BlackHole authors put the following message into their code: “I am a Trojan Horse, so i [sic] have infected your Mac Computer. I know, most people think Macs can’t be infected, but look, you ARE Infected [sic]!” The remote access Trojan (RAT) could direct browsers to specific Web pages and perform shutdown, restart and sleep operations.

See Also: Mac OS X Keyboard Shortcuts Cheat Sheet Programs Video

MacDefender (2011)

MacDefender used questionable search engine optimization tactics to direct users to infected websites claiming to scan Mac computers for malware. The page then offered to sell “MacDefender” protection to users who provided their credit card information. The problem affected thousands of Mac users, who flooded Apple support lines with calls.

Flashback (2011)

Flashback, the largest Mac botnet detected to date, affected over 800,000 Mac users. It used a Java exploit to entice Mac users to download what looked like Adobe Flash software. Anyone who downloaded the fake software enabled Flashback to transmit information about the computer, its operating system and any system settings. Flashback was designed to gather sensitive information, like passwords and bank account information.

Olyx (2011)

Olyx, like Flashback, gained access to Macs using a Java exploit. Olyx could download files from the Web onto the computer, and it could turn the Mac over to a remote command and control center for use as a botnet. A remote user, for example, could hijack a Mac and use it as part of a distributed denial-of-service (DDoS) attack on a bank or government website.

Revir and Imuler (2011)

Revir and Imuler constituted a phased Mac infection. Revir was the dropper and downloader, and Imuler was the backdoor. The infection was disguised as a PDF file, and once opened, it could capture screenshots, run executable files, send files to a remote computer and extract a Mac’s .zip archive.

Tsunami (2011)

Tsunami was a recycled version of an old piece of Linux malware. Also called “Kaiten,” the Mac-targeted version of Tsunami was specifically designed to recruit botnets for DDoS attacks. Tsunami contained a list of Internet relay chat (IRC) servers and channels. The malware, once installed, could connect back to the servers and become a soldier in a botnet army.

Devilrobber (2011)

Devilrobber was a Bitcoin generator that captured graphical processing unit (GPU) cycles to mine Bitcoins. If the Mac user had a Bitcoin wallet, then Devilrobber could steal the wallet. Devilrobber also forwarded usernames and passwords to remote computers and took screenshots of the Mac user’s Internet browsing. The malware spread via GraphicConverter through torrent sites like Pirate Bay.

Sabpab (2012)

Sabpab used vulnerabilities in Java and later in Microsoft Office to install itself as a backdoor on Mac computers. It could send the list of files on a drive to a remote computer, download and send files, run executables and take screenshots.

Lamadai, Kitm and Hackback (2013)

Lamadai targeted Tibetan non-governmental organizations (NGO), and both Kitm and Hackback spied on activists at the Oslo Freedom Forum. These Mac viruses demonstrated Macs could also be hijacked for espionage and political activism.

Minesteal (2013)

Minesteal disguised itself as a Minecraft Hack Kit and then stole players’ Minecraft login credentials and transmitted them to a remote computer. It could also download files from the Internet onto an infected Mac and send gathered information back to the malware authors.

Macs tend to have fewer security problems than Windows, but Mac users can’t take security for granted. Use good security practices, such as using good passwords and changing them often. Also, use antivirus software to keep Mac computers free of malware.

MacBook Air front angle image by Alejandro Escamilla from Unsplash.com.
MacBook rear angle image by Luke Chesser from Unsplash.com.
MacBook from top image by Galymzhan Abdugalimov from Unsplash.com.

The post Do Macs Get Viruses? 10 Examples From the Last 3 Years appeared first on AnsonAlex.

Show more