Stop the Noiz

Mac Trojans Exploit User Vulnerabilities, Not Security Holes

Frank Fox - 2009.02.03 - Tip Jar

With the news that Trojans have been found in pirated software, is it time to start worrying that Macs are not secure?

Something has changed, right?

Well, the news is important, but don't sell your Mac just yet. There is a big difference between a Trojan and a virus.

Both a virus and a Trojan can do the same things to your computer, but how they get installed is very different. A virus uses a weakness in the operating system to sneak in, while a Trojan uses deception to fool the user into installing it. These differences are important and worth looking at in more detail.

We all need applications to be installed on our computers to get anything done. Most applications run in their own little environment, and if anything goes wrong, the app crashes but the rest of the computer continues to run fine. This wasn't always true, but modern operating systems, like Windows XP and Mac OS X, do a better job of keeping each piece of software running safe away from others.

Some applications, like drivers, can't work alone. They need to work with many other applications. A printer driver has deeper access to your computer than other software. These applications/drivers can be written to avoid the protection of the operating system, because in order to function they has to do more than normally allowed.

Where do these applications get the permission to operate with so much access? From you, the user. That's why you get those alerts when you install or run a new program. The operating system is checking with the user before allowing anything new to run.

Once you run something for the first time, any malicious software code has a chance to run and take over your computer and mess things up. This is okay in the security sense, because you, the user, allowed it to happen. This is why you need to know what you are doing before installing software. (This is why I don't like it when my kids install software from the Internet.)

Trojans

Here is where Trojans come in. They are bad code hidden with good code. This is why the two Trojans were found with pirated software, the legitimate version of this software wouldn't have the Trojans attached. The user who downloads the pirated software unknowingly accepts the bad code when they installed the pirated software. Sure, a "virus checking" program can test for this situation once they learn about the problem, but it may be too late for you if you are one of the first who were downloading the pirated software.

The worst kind of Trojan is a rootkit exploit. This kind of malware is designed to hide itself in the operating system so that even the operating system doesn't know that it is there. This is the hardest to remove. Sony was accused of doing this with the copy protection software on its music CDs. This is not a good practice for legitimate program developers, and Sony had to settle the lawsuit against it.

We know that a Trojan is software you installed yourself - you personally gave permission for it to be on your computer. You were tricked into accepting it, but the computer did nothing wrong in following your request.

An application may be free of Trojans, but there will still be errors in the code (bugs) that usually don't hurt anything. Sure, errors may make the application crash, but the operating system should keep it isolated. The good news is that everyone is constantly trying to find and fix these errors to improve performance and keep things running smoothly.

Viruses

Among the people looking for these bugs are security experts and virus writers. If the security experts find it first, they are supposed to notify the programmers to fix their code. Once the bug is known to virus writers, they start figuring out a way to use the bug to insert bad code (a virus) into a document, picture, webpage, etc. This will trick the application into running the bad code (virus) and allow it to mess with your computer.

The virus writers wait until the day that a patch is announced to write a virus to exploit the flaw. This works, because not every computer is patched that same day - or even that month. They have time to circulate their virus to the unpatched computers and wreak their havoc. The sooner they release their virus, the more time it will have before systems are patched.

The shortest time is the zero day exploit, meaning a virus is written the same day the patch is released. Obviously these flaws are similar to older ones, for a virus to be written so quickly. This shows that the same sorts of mistakes are being made again and again. Constant work is going on to continually exploit computers. This, in turn, means that there is probably a big financial incentive to find and exploit these flaws.

Worms

A special type of virus is called a worm. This type has a way to replicate itself and move onto other computers, often through email or other network connection. The problem with worms is that they spread themselves and can quickly infect millions of computers, as the Conficker worm has been doing for months on Windows PCs.

A virus is worse than a Trojan because it works through applications that you installed in good faith. You have to trust something, and applications from good vendors should be safe. Virus writer are exploiting the flaws for their gain, but some of the problem does fall on the shoulders of the original software vendor for letting easy mistakes through.

Why the Mac has been better at security is whole other story. Finding two Trojans on pirated software doesn't change things much.

Remember that a Trojan is installed by a person who has been tricked, while a virus fools an application to allow it to run. To be safe don't run any software you are not sure of, especially pirated software. Also watch out for strange attachments in emails that come from people you don't know or who aren't in a habit of sending attachments. LEM

Join us on Facebook, follow us on Twitter or Google+, or subscribe to our RSS news feed

Today's Links

Recent Content

About LEM Support Usage Privacy Contact

Follow Low End Mac on Twitter
Join Low End Mac on Facebook

Favorite Sites

MacSurfer
Cult of Mac
Shrine of Apple
MacInTouch
MyAppleMenu
InfoMac
The Mac Observer
Accelerate Your Mac
RetroMacCast
The Vintage Mac Museum
Deal Brothers
DealMac
Mac2Sell
Mac Driver Museum
JAG's House
System 6 Heaven
System 7 Today
the pickle's Low-End Mac FAQ

Affiliates

Amazon.com
The iTunes Store
PC Connection Express
Macgo Blu-ray Player
Parallels Desktop for Mac
eBay

Low End Mac's Amazon.com store

Advertise

Open Link