Security researchers at Intego have reported the discovery of the latest variant of the OSX/Tibet Mac malware.
The malware, which Intego has dubbed OSX/Tibet.D, has been distributed in the form of a poisoned Java applet on compromised websites.
This ia common trick used by hackers today. Hackers breach a website known to be visited by a particular group of targets, rather than directly launch an attack against the targets themselves. Eventually someone visits the “watering hole” and their computer ends up poisoned and compromised.
In this particular case, visiting the website on an unpatched computer causes the Java archive to be dropped onto your Mac and launched without any user interaction. At that point, a secret backdoor is opened on the affected computer, contacting a command and control server based in China, and it can be used by a remote hacker to view and accesss files, as well as plant other code.
Because the malware exploits recently patched Java vulnerabilities, it acts as good a reminder as any of the importance of keeping your computer software up-to-date with security fixes. And remember to ask yourself – do you really need Java enabled on your browser at all?
If I were a betting man, I would put money on those responsible for previous attacks as being likely to be behind OSX/Tibet.D as well.
Although this particular Mac malware isn’t likely to be encountered by anyone who isn’t an active critic of China in Tibet, it’s clear that sophisticated hackers are interested in infecting computers and using malware to spy upon their intended victims.
Mac users need to wake up to the need to run good anti-virus software as much as their Windows cousins. And, once again, it’s important to stress the importance of keeping web servers, and the software running on them, up-to-date with security patches to lessen the chances of hackers being capable of embedding malicious code.
This isn’t financially-motivated malware. This is plain and simple espionage.