Categories: MacSecurityWorkspace

Tsunami Wave Of Mac DDoS Malware Spells Danger

Malware authors have ported Tsunami, a Trojan originally written for Linux systems, to hijack Mac OS X systems, security researchers found.

It appears to be derived from Kaiten, an old backdoor Trojan dating back at least to 2002, which was designed to infect Linux systems, blogged Robert Lipovsky, a malware researcher at security firm ESET. The compromised Macs could be used to launch distributed denial-of-service (DDoS) attacks, control the Mac remotely or to download further malware.

Recruiting a bot army

Tsunami derives its name from its primary goal: to force infected computers to become part of a bot network that will flood targeted Web servers with traffic and cause them to stop responding in a DDoS attack, according to Graham Cluley, a senior technology consultant at Sophos.

“Even though there is far less malware in existence for Mac OS X than for Windows, that doesn’t mean the problem is nonexistent,” Cluley wrote on the Sophos Naked Security blog.

The Tsunami Trojan program works by latching onto a host. Once it has been copied onto the system, either intentionally or maliciously, the malware attempts to connect to an Internet Relay Chat (IRC) channel to receive further instructions. The malware can launch DDoS attacks at a targeted server, download additional malware on the machine, and provide remote access to the system, Cluley said.

Pierre-Marc Bureau, an ESET senior malware researcher, said the new variant has the ability to launch automatically on reboot, causing it to be more persistent on the system, said . It also has an updated command and control IRC server and channel than the previous version. The Trojan is also evolving pretty quickly, as ESET researchers have already discovered at least one new variant, according to Bureau.

A work in progress

There are “very few hosts” infected with this malware, he said, noting that the program’s developers are most likely still in the process of testing the application.

On its blog, Mac security company Intego noted that the Kaiten source code has been publicly available since at least September 2009, and it was “trivial” to compile the code to create a Mac-executable using Apple’s XCode. Intego also noted that people may intentionally install the Trojan on their systems to voluntarily take part in specific DDoS attacks, such as those supporting Anonymous’ operations.

These “volunteers” have “effectively put control” of their Macs into someone else’s hands, Cluley said.

While there have been many instances of Windows malware re-engineered for the Mac platform, Tsunami appears to be the first that takes advantage of the fact that Mac OS X is based on BSD (Berkeley Software Distribution) Unix, an operating system with many similarities to Linux.

“If the bad guys think they can make money out of infecting and compromising Macs, they will keep trying,” Cluley said, predicting more malware targeting “poorly defended Mac computers”.

A flood of Mac malware

There has been a flurry of Mac malware activity recently. Beginning in September when F-Secure researchers found the Revir/Imuler Trojan, which was spread through malicious PDF files.

Another Trojan – called Flashback because it masquerades as an update to Adobe Flash or Flash Player installer – was detected later in September and went through various iterations this month, according to F-Secure. New capabilities include the ability to detect if the Mac had a firewall installed, as well as the ability to search for virtual machines and to delete itself if these were found.

The latest Flashback is far more sinister as it could disable Apple’s built-in Xprotect malware detection system by overwriting certain Xprotect files to prevent the system from getting new signature updates. Intego said Flashback was the first Mac malware that could “intentionally” damage system files. Removing the malware and restoring the system could be time-consuming, Intego noted.

“We hope Mac malware doesn’t use similar techniques in the future that would require a full installation of Mac OS X to repair damage,” Intego said.

Cluley warned Mac users to protect themselves from cyber-threats with proper security software. “Don’t be a soft target; protect yourself,” he said.

Fahmida Y Rashid eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved.

Recent Posts

Pebble Creator Debuts New Watches As ‘Labour Of Love’

Pebble creator launches two new PebbleOS-based smartwatches with 30-day battery life, e-ink screens after OS…

2 hours ago

Amazon Loses Appeal To Record EU Privacy Fine

Amazon loses appeal in Luxembourg's administrative court over 746m euro GDPR fine related to use…

3 hours ago

Nvidia, xAI Join BlackRock AI Infrastructure Project

Nvidia, xAI to participate in project backed by BlackRock, Microsoft to invest $100bn in AI…

3 hours ago

Google Agrees To $28m Settlement In Bias Case

Google agrees to pay $28m to settle claims it offered higher pay and more opportunities…

4 hours ago

Tencent Capex Triples As It Invests In AI

Chinese social media giant Tencent triples capital expenditure on AI data centres and other areas…

4 hours ago

EU Hands Apple First Interoperability Requirements

EU gives Apple demands for third-party developer access to iOS features and greater responsiveness in…

12 hours ago