Fake Snow Leopard sites leading to trojan infections

Hackers are trying to take advantage of users looking for free versions of the Snow Leopard software.

Criminals are already trying to take advantage of Mac users looking for Apple's Snow Leopard, with websites offering the software for free found to be carrying malware.

Trend Micro security researcher Feike Hacquebord found fake sites carrying a variant of the JAHLAV family of malware that can change a user's DNS server and point them towards a fake website - in some cases to phishing sites.

This is a similar threat to a version of JAHLAV that affected versions of Quicktime as well as pose as pirated versions of PDF application Foxit Reader.

Trend Micro solutions architect Rik Ferguson said that criminals were taking advantage of the "desire" and "greed" of people who were not willing to pay for the new OS when it is released.

"It's exploiting some very, very old human weaknesses," he said.

Apple seems to be taking notice of the new wave of Mac malware, with Ferguson saying that he had it confirmed from Snow Leopard beta testers that the real release would carry anti-malware controls.

"It's great that they are waking up to the threat I really, really welcome that," he said. "What I would say though of what I've seen pre-release, is that it is very rudimentary, very signature based for two types of malware, and that doesn't include the malware that was found in this case."

He said that the creators of JAHLAV were very likely the same kind of people behind traditional PC malware, as they were seeing similar techniques such as social engineering putting it in downloads people were searching for.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Safari bug lets websites track browsing activity and unique identifiers
web browser

Safari bug lets websites track browsing activity and unique identifiers

18 Jan 2022
El Salvador becomes latest target of Pegasus spyware
spyware

El Salvador becomes latest target of Pegasus spyware

13 Jan 2022
Mac shipments grew at twice the pace of PCs in 2021
Hardware

Mac shipments grew at twice the pace of PCs in 2021

13 Jan 2022
Apple becomes world's first $3 trillion company
business management

Apple becomes world's first $3 trillion company

4 Jan 2022

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022