The first is a worm known as Tored-Fam, which spreads via email attachments and is simply a variant on the well known Tored family of malware that has been in circulation since last year. The worm collects email addresses and attempts to forward itself to other computers.
A Sophos analysis of the worm's source code suggests that it is being used to build a Mac botnet known as Raedbot. This is being assembled by a malware writer called 'Ag_Raed', who is based in Tunisia.
The second piece of malware is a Trojan called Jahlav-C, which is embedded in an bogus pornography web site. Jahlav-C masquerades as an Active X video codec that needs to be downloaded in order to run the content.
"I've got a theory that, although many people are undoubtedly buying Apple computers because they're beautifully designed and well marketed, there will also be some who have dumped Windows because they are fed up with the spyware, pop-ups and virus attacks," said Graham Cluley, senior technology consultant at Sophos.
"Indeed, some of the people who may well have suffered a lot from those kind of attacks in the past may be exactly the same kind of folk who visit the grubbier areas of the internet in the wee small hours of the morning.
"And they may feel that one of the side benefits of switching to a Mac is that they won't have to worry about all of those nasty things while they're watching nasty things."
Sophos has posted a video of the Jahlav-C attack on YouTube.
Security firm warns of new Mac malware
By
Iain Thomson
on Jun 17, 2009 8:14AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Ingram Micro Ushers in the Age of Ultra

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Kaseya Dattocon APAC 2024 is Back

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Build cybersecurity capability with award winning Fortinet training from Ingram Micro
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report