Earlier this week, Russian security firm Dr. Web
published a blog post
announcing the discovery of a new OS X trojan horse known as
"Trojan.SMSSend.3666". The malware masquerades as an installer for
various software titles, but tricks users into signing up for
subscriptions through their mobile devices.
When a user starts such an installer, they see the interface that
imitates the installation wizard of a corresponding application. In
order to continue the "installation" fraudsters ask that the victim
enter their cellphone number into an appropriate field and then specify
the code found in a reply SMS. By performing these actions the user
agrees to terms of a chargeable subscription and a fee will be debited
from their mobile phone account on a regular basis.
Similar trojans have affected Windows and even Android platforms for
some time, but the tactic is now being used to target Mac users.
Apple
has moved quickly to address the threat, adding definitions for the
malware to its "Xprotect.plist" blacklist, which is part of the
basic anti-malware tools
Apple launched with OS X Snow Leopard in 2009. In its original
incarnation, users were required to update definitions manually, but as
malware threats against OS X grew, Apple last year instituted
automatic daily checks
to keep users' systems updated. The anti-malware tools automatically
detect when a user has downloaded a file matching the signature of known
malware, alerting the user of the threat and advising them to discard
the downloaded file.
http://www.macrumors.com/2012/12/13/apple-quickly-updates-malware-definitions-to-detect-new-sms-scam-trojan/
No comments:
Post a Comment