BlackHole RAT 2 Trojan Horse for Mac OS X Discovered

BlackHole RAT 2 Trojan Horse for Mac OS X Discovered

As predicted by the SecureMac team, the new version of BlackHole RAT 2 was officially released on a hacker message board this weekend, with some slight differences from the earlier version analyzed by SecureMac. The trojan horse, once installed, disguises itself as a Java Updater. In addition, the author is now referring to the trojan as Freeze RAT, but it contains much of the same code as BlackHole Rat 2.0a. The new version has a more complicated installation process that requires physical access to the computer, so SecureMac continues to rate this as a low threat.

April 3, 2011 • 3 min read
Vulnerability Found in Mac OS X 10.5

Vulnerability Found in Mac OS X 10.5

Core Security has discovered a vulnerability in Mac OS X 10.5 which could be used by a remote attacker to execute arbitrary code by getting the user to download a PDF document containing a embedded malicious CFF font. The advisory shows a communication timeline with Apple as well.

November 10, 2010 • 1 min read
Boonana Trojan Horse trojan.osx.boonana.a

Boonana Trojan Horse trojan.osx.boonana.a

Visit the Boonana advisory page for more details about the Trojan horse trojan.osx.boonana.a including initial analysis and removal instructions or download Boonana Trojan Horse Removal Tool directly.

October 28, 2010 • 3 min read
Trojan Horse Alert: HellRaiser (aka OSX/HellRTS.D)

Trojan Horse Alert: HellRaiser (aka OSX/HellRTS.D)

Trojan Horse Alert: Intego recently alerted users to the presence of a new variant of the HellRaiser Trojan Horse, which they identify as OSX/HellRTS.D. SecureMac has analyzed this new variant and it is detected in the latest MacScan spyware definitions update (Spyware Definitions Version 2010006) as HellRaiser Trojan Horse 4.2. MacScan has detected previous variants of this trojan horse since 2005.

HellRaiser is a trojan horse that allows complete control of a computer by a remote attacker, giving the attacker the ability to transfer files to and from the infected computer, pop up chat messages on the infected system, display pictures, speak messages, and even remotely restart or shut down the infected machine.

The attacker can search through the files on the infected computer, choosing exactly what they want to steal, view the contents of the clipboard, or even watch the user’s actions on the infected computer.

In order to become infected, a user must run the server component of the trojan horse, which can be disguised as an innocent file. The attacker then uses the client component of the trojan horse to take control of the infected system.

Read more about HellRaiser Trojan Horse aka OSX/HellRTS.D

April 16, 2010 • 2 min read
Mac OS X Security Update

Mac OS X Security Update

Mac OS X security update (2010-001) has been posted by Apple fixing several security issues including a Adobe Flash. Other security fixes include CoreAudio, cupsd printing scheduler, issues with DMGs,TIFFs, SSL and TSL. To update your system access the software update icon within the System…

January 18, 2010 • 1 min read
Safari Vulnerability

Safari Vulnerability

SecureMac Advisory Posted: June 9th, 2009 Security Risk: Critical Safari prior to version 4 (released June 8th, 2009) may permit malicious web pages to steal files from the local system simply by accessing a web page without further interaction. This vulnerability is present in both…

June 7, 2009 • 1 min read
DNS Changer 2.0e Trojan Horse

DNS Changer 2.0e Trojan Horse

SecureMac Advisory Posted: March 17th, 2009 Security Risk: Critical Just after the DNSChanger 2.0d variant was identified, another new variant of the DNSChanger Trojan Horse, DNSChanger 2.0e, has been discovered in the wild. The trojan horse arrives in a disk image (some samples are called…

March 2, 2009 • 3 min read
Security Alert: Trojan found in Pirated copies of Apple’s iWorks 09

Security Alert: Trojan found in Pirated copies of Apple’s iWorks 09

Security Alert: A trojan is being distributed with pirated copies of Apple’s iWorks 09. Pirated copies of iWorks 09 are being distributed with a trojan bundled in the installer package. Intego has released a warning recommending that users should not download iWorks 09 from pirate…

January 22, 2009 • 1 min read
Mac OS X Security Issue: FileVault Leaves Unencrypted Data Behind

Mac OS X Security Issue: FileVault Leaves Unencrypted Data Behind

Mac OS X FileVault Security Advisory Advisory Title: FileVault Leaves Unencrypted Home Data Behind Release Date: 2003 November 6 Fix Date: Mac OS X 10.4 (May 2005) Affected Product: Mac OS X 10.3 Build 7B85 Impact: Unencrypted Data Left Behind Where: Local System Author: CodeSamurai…

November 6, 2003 • 3 min read
Mac OS X Security Issue: Screen Lock Security Bypass Mac OS X 10.3 Panther

Mac OS X Security Issue: Screen Lock Security Bypass Mac OS X 10.3 Panther

Affected Product: Mac OS X 10.3 Build 7B85 Severity: Low Impact: Security Bypass Where: Local System Author: CodeSamurai (codesamurai@mac.com) VULNERABILITY With access to the keyboard, an unauthorized user can access the currently active screen-locked user environment. However, there is only a relatively small opening in…

October 4, 2003 • 2 min read