Entering text into the input field will update the search result below

The Mac OS X Malware Myth Continues

Nov. 05, 2007 8:14 AM ETApple Inc. (AAPL)10 Comments
Yankee Group profile picture
Yankee Group
108 Followers

By Carl Howe

Continuing a non-story that will never die, Wired Magazine has an article about the threat of Mac OS X malware, in which I was quoted. I spoke with the author, Ryan Singel, by phone yesterday, and disputed the premise that Apple's (NASDAQ:AAPL) market share grows, it will be subject to the same degree of malware that Windows is. Unfortunately, something got lost in the translation. Here's the quote:


But Carl Howe, an Apple analyst at Blackfriars Communications, disputes the security researchers' theories. He thinks that OS X's Linux heritage makes Apple systems less vulnerable to attack than Windows-based platforms. He argues that even if hacking Macs hasn't been profitable in the past, attackers would have done it anyway if they'd been able -- just for the attention.

"I think the market-share thing has always been a myth," Howe said. "It's a good story to talk about."

What I actually said was Mac OS X's Unix heritage, not Linux. I wrote Ryan about the mistake, and he corrected it. But I just wanted my readers to know I don't have my *nix's mixed up if they saw the earlier version.


But overall, I do stand by my statement that the whole Mac OS X malware story is one of those urban myths that just won't die, just like Craig Shergold, the child with cancer who wanted to get into the Guiness Book of World Records for the most business cards (which, by the way, was true in 1989, but he survived and no longer needs cards). For an ordinary consumer, it's easy to think that since Mac OS X and Microsoft (MSFT) Windows both looks somewhat similar, that they must be similar underneath and exhibit similar vulnerabilities. Therefore, the reasoning goes, the difference in malware must just be due

This article was written by

Yankee Group profile picture
108 Followers
The people of Yankee Group are the global connectivity experts–the leading source of insight and counsel trusted by builders, operators and users of connectivity solutions for nearly 40 years. We are uniquely focused on the evolution of Anywhere connectivity, and chart the pace of technology change and its effect on networks, consumers and enterprises. Headquartered in Boston, Yankee Group has a global presence, including operations in Europe, the Middle East, Africa, Latin America and Asia-Pacific.

Recommended For You

Comments (11)

d
Advanced Malware Analysis

What has become accepted as “reverse engineering training” is really just malware analysis that simply consists of “run-time analysis”. What this means is that you put the malware on a virtual machine and run a packet sniffer (like Wireshark), a registry monitor (like regshot), a file monitor (like filemon) and then a process monitor (like process explorer).
These common “reverse engineering” courses have you run malware and answer the questions:

1. Where is it connecting to?
2. Does it modify the registry?

3. Does it modify the file system?
4. Does it modify any running processes or start any new ones?
You don’t need a class to teach you these things.

The goal of the AMA training class is to provide a methodical hands-on approach to reverse-engineering by covering both behavioral and code analysis aspects of the analytical process.

The course begins by looking into PE headers and how to handle DLL interactions. Then it moves on to the fundamentals of x86 architecture assembly. Next you learn to examine malicious code in order to understand the program’s key components and execution flow. You then learn to identify common malware characteristics by looking at Windows API use patterns, and will examine excerpts from bots, rootkits, key loggers, and downloaders. From there you move on to standard and custom packers and other tools and techniques for bypassing anti-virus, and then on to malware with anti-debugging/anti-an... capabilities. Then the class is concluded with obfuscated browser scripts.

You can purchase this course by clicking here.

Day 1: Basic Forensics

Analyzing a hard drive image
Recovering deleted files
Decrypting encrypted files

Day2: Bypassing Anti-Virus

Using Hex Editors to bypass AV
Using packers to bypass AV
Using debuggers/disassemblers to bypass AV

Day3: Network/Browser Forensics

Advanced pcap analysis
De-obfuscating malicious javascript

Day4: Memory Analysis

Memory analysis
Malicious pdf file analysis
DLL injection

Day5: Reverse Engineering

Binary modification/patching techniques
Anti-Debugging/Anti-An... techniques
Exploit development

Course Instructor
The course instructor is security consultant and trainer Joe McCray. Joe McCray has 10 years of experience in the security industry with a diverse background that includes network and web application penetration testing, incident response, and forensics in the both DoD community and the private sector. Joe is also a frequent trainer/presenter at security conferences such as Black Hat, Def Con, ToorCon, BruCON, LayerOne, TechnoSecurity, and TechnoForensics.

General Course Info

Course dates are October 3rd – 7th. The course will be comprised of 5 days of 50 minute sessions with 5-10 minute breaks, and an hour for lunch.

Pre-requisites:
Students must be familiar with IT Security best practices, and have a good understanding of TCP/IP and common web technologies.

* Basic Windows administration for both servers and workstations

* Basic Linux/*NIX system administration skill

* Basic command-line proficiency on both Windows and *NIX systems

Students should be familiar with the following web technologies and languages:
* HTTP
* HTML
* Javascript
* ASP
* PHP
* SQL

Please follow the link: http://bit.ly/1gCCH67
S
I can't believe my eyes is such bad article! Most MalWare is depended on Software only and not hardware!! Even if the Windows broad hardware compatibility opened software breaches, that does NOT mean Apple is Safer, I use a Mac because I like the simplicity and organization apps have, but thinking Apple is free of Malware is just simply a lie! I am advanced computer user, and while I know and suspicious of some apps, it's impossible to say if the code is 100% secure, and that's more danger in closed OSs as Apple Mac OS X, while Linux, Ubuntu, Fedora etc has the code publicity available, as most of Linux apps, Mac OS X and Windows DO NOT HAVE! Maybe that's why Little Snitch founds lot of apps trying to connect to strange IPs or I have found some trojan horses in my MAC OS X 10.6.7 computer! Windows has plenty of Virus, but Microsoft actually is trying hard to be safer on it, and lots of technologies they are implementing to to so, Windows MalWare defender, Apps signatures etc etc, in the other hand Apple is doing NOTHING, just says their OS is safer and Secure which is a LIE! For an example How can Apple really can talk in security when with FileVault Home Folders encryptions on, the Time Machine can only make an UNENCRYPTED BACKUP to local disks!!!!!!
g
garync
21 Feb. 2010
Does one incur Windows level risks by running Windows software via a Windows emulator on a Mac?
P
PaulX
25 Nov. 2009
The only problem with using a MAC is that of affordable software availability. A friend of mine tried to use the MAC version of Open Office to no avail. He also found .doc files saved on a MAC at home in Word for MAC could not always be opened on a PC at University - and vice versa.

I am a fan of Linux, because of its relative security compared with Microsoft's products, and its financial benefits over allowing oneself to be locked into the MAC system. But I have to admit it does not work as easily as XP Pro either..
Neil Anderson profile picture
Have you seen any figures on the numbers of Mac users affected by the trojan OSX.RSPlug.A?
J
Carl, the Mac community owes you a great debt. Many thanks for all of the efforts to set the record straight.
t
I remain to be convinced.

Windows experience suggests that wherever there is a hole it will be exploited (or already has been)

www.pixentral.com/show...

(OS X 10.5 with block all incoming selected through preferences)
T
This is MSFT's dilemma as the only publicly traded OS vendor that still uses proprietary cr*p instead of UNIX: If they sit down and take the time to write a modern, 21st century OS, like Steve Jobs did at NeXt and Apple did under his direction these past 6 years (or like SuSe, Ubuntu, or Red Hat), they will break 30 year old legacy DOS junk and they'll start to bleed market share at a faster rate. Heck, it took them 5 years just to change the eye-candy on XP and call it Vista. They AREN'T going to solve Windows' existing security holes that they have accumulated through decades of "spaghetti code".
b
It also took 5 years to change the eye candy on Windows 95 (aka ME, W2K) as it took 5+ years to change the eye candy of Windows 3.1 which was essentially eye candy for DOS to begin with.

OS X is the only OS with origins in a multiuser, multitasking, secure OS, while Windows in all its incarnations has been an attempt to retrofit security to an aging interface.

With OS X, Apple completely scrapped its legacy OS and started over with a clean sheet using a BSD Unix core. Windows has no analogous core other than MS-DOS. Without scrapping Windows and starting from scratch, nothing from MSFT will ever be as secure as OS X.
T
I don't think MS has to scrap Windows and start from scratch. Apple didn't even start over from scratch. The Carbon API is an OS X port of the "Classic" API that Apple stopped selling over a half decade ago and stopped supporting last week. The Carbon version has also been abandoned in 32-bit land. Expect it's support to end in 2 to 4 years.

I think that MS should take THAT page from Apple's book and start depreciating API sets (like any Direct X before 7 and the entire Win16 API) and port their new APIs to a BSD based filesystem running on a their 64-bit NT kernel.

Backward compatibility all the way back to PC-DOS 1.0 may be what MADE Microsoft, but it will be what kills it if it doesn't start pruning their code base (regardless of how many lazy grey-beard developers it will piss off).
S
This is true for many products made by Microsoft. In my opinion, Microsoft tries too hard to be "backwards-compatible," even to the point of including a compatibility feature in IE8. Internet Explorer is a good example of Microsoft's problem with backwards compatibility. They're starting to get the picture, but they really need to start doing their best to encourage and enforce the deprecation of out-dated softwares, most notably older versions of Windows, and for us web developers, Internet Explorer.
Disagree with this article? Submit your own. To report a factual error in this article, . Your feedback matters to us!

About AAPL

SymbolLast Price% Chg
Market Cap
PE
Yield (TTM)
Rev Growth (YoY)
Short Interest
Prev. Close
Compare to Peers

More on AAPL

Related Stocks

SymbolLast Price% Chg
AAPL
--
To ensure this doesn’t happen in the future, please enable Javascript and cookies in your browser.
Is this happening to you frequently? Please report it on our feedback forum.
If you have an ad-blocker enabled you may be blocked from proceeding. Please disable your ad-blocker and refresh.