Home Business IT Security Bitcoin miner Trojan arrives for Mac OS X

Trojanised versions of legitimate Mac software steal processing power as well as information.

First, some background. Bitcoin is a digital currency that can be exchanged with 'real world' currencies, though the exchange rates are highly variable.

Generating a Bitcoin is computationally intensive, and those who carry out the necessary calculations are rewarded with a payment in Bitcoins. This process is called 'mining'.

The number of Bitcoins you can earn is limited by your hardware - unless you can persuade or trick other people to run Bitcoin-generating software on their systems for your benefit. And that's what miner malware does.

A miner for Mac OS X has turned up within copies of the popular GraphicConverter program that are being distributed via BitTorrent (according to security company Sophos) and in a small number of additional but unspecified applications according to Intego. Variously named DevilRobber or Miner-D, the malware doesn't only mine Bitcoins.

It also steals a variety of data - depending on the exact variant, some combination of: usernames and passwords (Keychain files), browser (Safari, Firefox) and bash (Terminal) history, the Bitcoin wallet, and information relating to the use of TrueCrypt encryption and the Vidalla TOR plugin for Firefox. And for good measure it takes screenshots.

Intego suggests it also searches for child pornography, though Sophos senior technology consultant Graham Cluley noted that "It's unclear whether this [search for files matching "pthc"] is intended to uncover child abuse material or not (the phrase "pthc" is sometimes used on the internet to refer to pre-teen hardcore pornography)."

So what can you do about it? Find out on page 2.

 

 

WEBINAR 7th May 11am - WOW 802.11

Learn how Ruckus Redefines High-Speed, High Capacity Wi-Fi with Industry’s First 802.11ac Wave 2 Access Point

THIS IS ONE NOT TO MISS SO REGISTER NOW

DON'T MISS OUT - REGISTER NOW!

FREE - SYDNEY & MELBOURNE BUSINESS INTELLIGENCE EVENTS

The Holy Grail of the Business Intelligence (BI) industry – pervasive deployments and widespread end-user adoption – has remained an illusive dream for years. Until now!

REGISTER & SECURE YOU PLACE / BRING A FRIEND

Melbourne - venue Captain Melville’s CBD 2:30 – 6:00pm, Tuesday 28th April

Sydney - venue Redoak CBD 2:30 – 6:00pm, Thursday 30th April

DON'T MISS OUT - MELBOURNE REGISTER NOW!

DON'T MISS OUT - SYDNEY REGISTER NOW!

FREE WHITEPAPER - RISKS OF MOVING DATABASES TO VMWARE

VMware changed the rules about the server resources required to keep a database responding

It's now more difficult for DBAs to see interaction between the database and server resources

This whitepaper highlights the key differences between performance management between physical and virtual servers, and maps out the five most common trouble spots when moving production databases to VMware

1. Innacurate metrics
2. Dynamic resource allocation
3. No control over Host Resources
4. Limited DBA visibility
5. Mutual ignorance

Don't move your database to VMware before learning about these potential risks, download this FREE Whitepaper now!

DOWNLOAD!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences, a PhD in Industrial and Business Studies, and is a senior member of the Australian Computer Society.

Connect