On Feb 21, 2006, at 8:34 PM, Nancy Haitz wrote:

Yesterday Bruce wrote:
Meanwhile, our mail server has stopped 290 different Windows viruses from 284 different hosts since midnight.


Bruce,

You seem to be out on the bleeding edge of the new virus world (as are most universities). What are your thoughts on the new Zip Archive attack? Details here <http://www.macworld.co.uk/news/ index.cfm?NewsID=13911&Page=1&pagePos=2> and here <http:// secunia.com/advisories/18963/>


Actually this isn't as nasty as it appears at first glance.

This is, in fact a very old vulnerability that's been 'discovered' countless times...the underlying mechanism has existed since the Mac OS has has resource forks, along about 1984 or so, and this is largely the same thing as in the MP3 Concept "virus" of 2004 <http:// secunia.com/virus_information/8739/macmp3concept.a/>. (which you'll notice that secunia rates as a *low* threat.)

Trojans for the Mac OS as old as OS 6 have been written using this mechanism.

File metadata (Creator/filetype/extension) can be forged, tricking people into running a program under the pretext of it being a data file, and this attack is essentially identical to the many hotnekkidbritney.jpg.pif attachments you see on the PC side. Since Windows by default hides the extension, people think they're clicking on hotnekkidbritney.jpg.

The advice, disabling the "Open safe files after downloading" option in Safari is VERY GOOD, but simply unpacking the Zip file does NOT cause it to be executed, which SANS intimates.

On Firefox the POC downloads and sits there. If unzipped, it also just sits there. The payload DOES execute if you double-click on the thing. This isn't *nothing*, it's just not as automatic as, say, an ActiveX exploit of Windows.

Like the MP3 Concept before it, <http://dbdev2.pharmacy.arizona.edu/ miscjunk/Trojan_poc_finderview.pdf>, properly identified as an application, this one also displays its true colors in the Finder <http://dbdev2.pharmacy.arizona.edu/miscjunk/Bad_zip.png> where it's recognized as a terminal script.

Doing Get Info on the file shows the same information that it's a script.

Note: dragging the file onto QT player, (in the case of the Secunia POC) does not cause the script to run either, only double-clicking on it does. Someone on our netmanagers list has reported that the trick doesn't actually work in Mail: Mail says that "The attachment is about to run a program, are you sure you want to do this?"

My guess is that were this to be a simple exploit to use, we'd have seen real consequences by now, since it's been around since the Mac has had resource forks, that is, since 1984 or so.

Unfortunately, while widspread, identical versions of this are something that can easily be detected by AV programs, the underlying issue needs to be dealt with on a system level by Apple.

--
Bruce Johnson

This is the sig who says 'Ni!'


--
G-List is sponsored by <http://lowendmac.com/> and...

Small Dog Electronics    http://www.smalldog.com | Refurbished Drives |
-- We have Apple Refurbished Monitors in stock!  |  & CDRWs on Sale!  |

     Support Low End Mac <http://lowendmac.com/lists/support.html>

G-List list info:       <http://lowendmac.com/lists/g-list.shtml>
 --> AOL users, remove "mailto:";
Send list messages to:  <mailto:g-list@mail.maclaunch.com>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>

iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com

Reply via email to