spacer
  • SANS Site Network
    • Current Site
    • spacer Internet Storm Center
    • Choose a different site Help
    • spacer Training
    • spacer Certification
    • spacer Cyber Security Graduate School
    • spacer Security Awareness Training
    • spacer Computer Forensics
    • spacer Penetration Testing
    • spacer IT Audit
    • spacer Software Security
Threat Level: spacer
  • Storm Center
    • Diary Page
    • Diary Archive
    • ISC Podcasts
    • Daily Stormcast!
    • Security News
    • ISC Handlers
    • ISC Events
    • ISC on Twitter
    • ISC Poll
    • ISC Search
  • Tools
    • Tools List
    • Feeds (XML/RSS)
    • Infocon Status
    • Link to ISC
    • Video/Audio
    • Presentations/Papers
    • Links
    • Glossary
    • Download Our Sensor!
  • Data/Reports
    • Summary Page
    • ISC/DShield API
    • HTTP Headers
    • 404Project
    • Suspicious Domains
    • Report Fake Calls
    • Submit Logs
    • Using DShield Data
    • Webhoneypot
  • My ISC
    • ISC Login
    • SANS Portal »
  • Contact
    • About ISC
    • Contact Form
    • Security Contact
    • Submit Site Bug
    • Submit Logs
    • Privacy Policy

ISC Diary

Refresh Latest Diaries

Handler on Duty:
Jim Clausing
Contact Us
  • previous
  • next

Mac OS X trojan - OSX/Leap

Published: 2006-02-16,
Last Updated: 2006-02-17 00:06:32 UTC
by Jason Lam (Version: 1)

0 comment(s)

Readers have written in about the new Mac OS X trojan that are spreading via iChat. This one looks like difficult one to propagate widely. The trojan masquerade itself as a JPEG file wrapped in a tgz archive. User will have to deliberately decompress the files and open (execute) the resulting JPEG in order to get infected. Unless the user is already running as admin, admin password will be prompted as well.

You almost have to work hard to get infected, seems like this is just the beginning of more Mac OS X malware to come in the future with stronger capability to spread.

Details can be found at:

www.ambrosiasw.com/forums/index.php?showtopic=102379
www.macrumors.com/pages/2006/02/20060216005401.shtml
vil.nai.com/vil/content/v_138578.htm

------------
Jason Lam
Keywords:
0 comment(s)
Top of page

  • previous
  • next

Top of page

Comments

New Comments closed for all Diaries older than two(2) weeks
Please send your comments to our Contact Form

spacer Diary Archives

Top of page
site/port/ip search:

Get ISC Swag!!


Advertisement

Security News Feeds

InternetStormCenter
  • Microsoft November 2012 Black Tuesday Update - Overview, (Tue, Nov 13th)
SANS Newsbites
  • Australia Becomes First Nation To Discover Reliable Method of Stopping Targeted Attacks (October 30 & 31, 2012)
SANS @Risk
  • (1) HIGH: Google Chrome Sandbox Escapes

Diary Archives

Microsoft November 2012 Black Tuesday Update - Overview - by: Jim Clausing (2012-11-13)

Request for info: Robocall Phishing Against Local/Regional Banks - by: John Bambenek (2012-11-12)

Fresh batch of Microsoft patches next week - by: Mark Baggett (2012-11-09)

View Diary Archives

Search Diaries:

spacer

View our Privacy Policy

Contact Us

Phone: (757) SANS-ISC (726-7472) - Voice Mail Only
Web Contact: handlers@isc.sans.edu
Report Bugs: Sourceforge Project
Debug Info: Browser Debug Info

"The experiences gained in the SANS Technology Institute program have helped me advance in IBM, taking a more public facing role."
- Jerome Radcliffe, SANS Technology Institute Student

"SANS is a 'giving back to the community factory.' SANS encourages and fosters growing security awareness and growing the security community."
- Rob VandenBrink, Alumni of SANS Technology Institute

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.