{"id":11716,"date":"2018-03-12T06:30:03","date_gmt":"2018-03-12T14:30:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/03\/12\/news-5486\/"},"modified":"2018-03-12T06:30:03","modified_gmt":"2018-03-12T14:30:03","slug":"news-5486","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/12\/news-5486\/","title":{"rendered":"Warning as Mac malware exploits climb 270%"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/03\/red-padlock_cybersecurity_threat_ransomeware-100751597-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Mon, 12 Mar 2018 05:56:00 -0700<\/strong><\/p>\n<p>Reputable anti-malware security vendor\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/03\/the-state-of-mac-malware\/\" rel=\"nofollow noopener\" target=\"_blank\">Malwarebytes<\/a>\u00a0is warning Mac users that malware attacks against the platform climbed 270 percent last year.<\/p>\n<p>The security experts also warn that four new malware exploits targeting Macs have been identified in the first two months of 2018, noting that many of these exploits were identified by users, rather than security firms.<\/p>\n<p>In one instance, a Mac user discovered that their DNS settings had been changed and found themselves unable to change them back.<\/p>\n<p>This particular item of malware (<a href=\"http:\/\/bgr.com\/2018\/01\/16\/mac-malware-threat-osx-mami\/\" rel=\"nofollow noopener\" target=\"_blank\">OSX.MaMi<\/a>) also installed a trusted root certificate on the person&#8217;s Mac. The threat left the user vulnerable to fraudulent phishing websites posing as the real deal and man-in-the-middle attacks.<\/p>\n<p>The researchers also identified a new Java-based exploit targeting Macs that is based on malicious code likely developed for nefarious purposes by a nation state. Another attack included deployment of malicious links on a popular software downloads website.<\/p>\n<p>Malwarebytes warns that such attacks are on the increase, adding that while Mac users are using secure platforms, they should not consider macOS to be \u201cbulletproof.\u201d<\/p>\n<p>There is a wide perception that Apple\u2019s platforms are invulnerable to such attacks, but it\u2019s a misplaced belief.<\/p>\n<p>It is, of course, true that Macs (and iOS devices) are far more secure than other platforms, but this does not make them invulnerable.<\/p>\n<p>The perception that Apple\u2019s platforms are more secure must be tempered with caution \u2014 particularly as its platforms enter the enterprise.<\/p>\n<p>\u201cApple\u2019s macOS includes some good security features that are helpful, but they are easily bypassed by new malware, and they don\u2019t address the adware and PUP problem at all,\u201d Malwarebytes warns.<\/p>\n<p>Attacks can be complex.<\/p>\n<p>Think about the <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2015\/11\/xcodeghost_s_a_new.html\" rel=\"nofollow noopener\" target=\"_blank\">XcodeGhost<\/a> exploit in 2015, in which a fake copy of Xcode that injected malware into apps developed using it was distributed. The effect was that multiple malware-infested apps appeared (albeit briefly) on Apple\u2019s App Store. The attack was spotted fast and dealt with, but the story proves the need to exercise some caution.<\/p>\n<p>The most professional attacks are motivated by money, and attacks cost money to create.<\/p>\n<p>While it remains true that mounting successful attacks against Macs is costly, there is always the risk that attackers will use complacency concerning security within more complex attempts.<\/p>\n<p>Meanwhile, we see <a href=\"https:\/\/blogs.computerworld.com\/article\/3255625\/apple-mac\/mac-what-does-system-scan-is-recommended-mean.html\" rel=\"nofollow\">browser-based attacks proliferate<\/a> while hackers <a href=\"https:\/\/blogs.computerworld.com\/article\/3261128\/apple-ios\/criminals-pay-just-15-for-apple-icloud-account-ids-report-claims.html\" rel=\"nofollow\">buy and sell Apple ID details for $15 a time<\/a>.<\/p>\n<p>Security firms I\u2019ve spoken to warn that professional hackers will use different forms of attacks against different platforms, all connected to the same command and control systems.\u00a0In this way, they seek to break through existing enterprise security protections.\u00a0<\/p>\n<p>The scale of enterprise security threats needs to be understood.<\/p>\n<p>A <a href=\"https:\/\/www.ponemon.org\/\" rel=\"nofollow noopener\" target=\"_blank\">Ponemon Institute<\/a> report claims that as many as 3 percent of the mobile devices being used across the enterprise are affected by malware at any given time, and in many cases, the company is unaware of the problem.<\/p>\n<p>The move to defend against such incidents is prompting development of mobile threat detection systems that monitor device and network traffic for signs that an exploit may have taken place.\u00a0<\/p>\n<p>As the number of attacks against macOS and Apple\u2019s other platforms climbs, it seems reasonable that users take steps to inform themselves of good security practise and to put them into place to protect themselves:<\/p>\n<p>There\u2019s no need for panic. Apple, Cisco, Aon, and Allianz <a href=\"http:\/\/www.applemust.com\/apple-ceo-tim-cook-speaks-at-cisco-live-confirms-enterprise-focus\/\" rel=\"nofollow noopener\" target=\"_blank\">recently launched<\/a> a security insurance system that <a href=\"https:\/\/blogs.computerworld.com\/article\/3253248\/security\/apple-provides-superior-cybersecurity-protection.html\" rel=\"nofollow\">confirms Apple\u2019s platforms can be more secure<\/a>.<\/p>\n<p>However, as the scale and number of threats intensify, it makes sense to follow good security practices as you go about your Mac life, particularly if you use your system to handle confidential, financial, or enterprise data.<\/p>\n<p><strong>Google+?<\/strong>\u00a0If you use social media and happen to be a Google+ user, why not\u00a0join\u00a0<a href=\"https:\/\/plus.google.com\/u\/0\/communities\/102592251674546201152\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic&#8217;s Kool Aid Corner community<\/a>\u00a0and get involved with the conversation as we pursue the spirit of the New Model Apple?<\/p>\n<p><strong>Got a story? Please\u00a0<\/strong><a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow noopener\" target=\"_blank\">drop me a line via Twitter<\/a>\u00a0and let me know. I&#8217;d like it if you chose to follow me there so I can let you know about new articles I publish and reports I find.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3262225\/apple-mac\/warning-as-mac-malware-exploits-climb-270.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/03\/red-padlock_cybersecurity_threat_ransomeware-100751597-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Mon, 12 Mar 2018 05:56:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Reputable anti-malware security vendor, <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/03\/the-state-of-mac-malware\/\" rel=\"nofollow\">Malwarebytes<\/a>, is warning Mac users that malware attacks against the platform climbed 270 percent last year.<\/p>\n<h2><strong>Be careful out there<\/strong><\/h2>\n<p>The security experts also warn that four new malware exploits targeting Macs have been identified in the first two months of 2018, noting that many of these exploits were identified by users, rather than security firms.<\/p>\n<p>In one instance, a Mac user discovered that their DNS settings had been changed and found themselves unable to change them back.<\/p>\n<p>This particular item of malware (<a href=\"http:\/\/bgr.com\/2018\/01\/16\/mac-malware-threat-osx-mami\/\" rel=\"nofollow\">OSX.MaMi<\/a>) also installed a trusted root certificate on their Mac. The threat left the user vulnerable to fraudulent phishing websites posing as the real deal and man-in-the-middle attacks.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3262225\/apple-mac\/warning-as-mac-malware-exploits-climb-270.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11078,10480,714],"class_list":["post-11716","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple-mac","tag-ios","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11716"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11716\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}