Mac OS X malware used in targeted attacks

By Marcos Colon on Apr 17, 2012 1:55 PM
Filed under Security

Targets 'Flashback' Java vulnerability.

Just as the news surrounding the outbreak of the Flashback trojan that infected nearly 650,000 Mac OS X machines began to subside, experts have discovered another threat to the platform.

Security firm Symantec released a report on Friday indicating a new trojan is targeting the same (now-patched) vulnerability that the Flashback malware took advantage of in Java.

Once the malware, dubbed “Sabpub,” is injected into a user's computer, it has the ability to open a back door that enables miscreants to send commands to the infected computer, including taking screenshots, downloading files or installing additional malware.

Symantec classified the infection as a “very low” risk trojan and research conducted over the weekend by Russian-based Kaspersky Lab may indicate why the threat level is not comparable to that of Flashback.

According to a blog post Saturday by Costin Raiu, director of Kaspersky Lab's global research and analysis team, Sabpub is designed for use in “targeted attacks.”

“At the moment, it is not clear how users [were] infected with this, but the low number and its back door functionality indicates that it is most likely used in targeted attacks,” he wrote.

Raiu reported that the IP address of the command-and-control (C&C) server which hosts Sabpub is shared with that of a previous attack, known as “Luckycat,” discovered by Kaskersky in March. That was an advanced persistent threat (APT) campaign targeting Tibetan activists.

“The IP address of the C&C to which this bot connects (199.192.152) was also used in other Windows malware samples during 2011, which made us believe we were looking at the same entity behind these attacks,” Raiu wrote.

Further, a separate blog post on Sunday revealed that there are at least two variants of Sabpub in the wild: one which attacks the vulnerability in Java, and another that focuses on an older vulnerability in Microsoft Word for OS X.

“The Word documents exploited a vulnerability in Microsoft Word (including Microsoft Office for Mac), to install an older version of the malware,” Seculert CTO Aviv Raff said. “These seem to be the method of operation used by the attackers before they started using the Java exploits.

Kaspersky Lab senior researcher Roel Schouwenberg suspected the attacks occurred through infected websites and via phishing emails.

Flashback infected computers through drive-by downloads that results in greater infection numbers. Although Sabpub used the same Java vulnerability, the malware was spread via targeted spam messages, leading experts like Schouwenberg to say infection numbers could be fewer than 100.

“People definitely need to make sure their software is up to date, just like with Windows,” Schouwenberg said. “So that's not just OS X, but also Java and Office. Obviously, running security software will help.”

A spokesperson for Apple could not be reached for comment.

This article originally appeared at

Follow us on Facebook and Twitter

Copyright © SC Magazine, US edition


Mac OS X malware used in targeted attacks
Top Stories
Datacom snatches $242m deal off IBM
IBM's 15-year relationship with Dept of Health over.
Five tech April Fools pranks pulled today
NBN memorabilia, Google’s new invention and more.
Microsoft releases cheaper Surface 3
Windows RT gone, full 64-bit OS to run.
Sign up to receive CRN email bulletins
Do you get value out of partner conferences?

Latest Comments
CRN Magazine

Issue: 335 | January/February 2015

CRN Magazine looks in-depth at the emerging issues and developments for the channel, and provides insight, analysis and strategic information to help resellers better run their businesses.