said by article :Over the past few weeks, I have found Mac malware and Windows malware side by side on the exact same compromised web sites, served up by Google search results.
My, my! Just think! Of all the things! Who'd of thought of that! What's the world coming to!
A number of years ago, a Wilders Security Forum member who did a lot of testing, commented in essence that any set of code had the potential to be misused for malicious purposes.
So, none of this is a surprise to those who have followed the evolution of malware exploits and targeting.
It made me recall the early days of Firefox, where, in the Mozilla forum, you risked tar and feathering if you dared suggest that FF could be exploited.
Now, the message has changed: So what if exploits surface - Mozilla patches quickly.
And so it goes...
Now, no matter the application or Operating System, there are just two attack vectors,
- 1) Remote Code Execution (aka drive-by) tailored to the possible vulnerabilities in the user's system, a la exploit kits
- 2) Social Engineering tricks
Thus, the article again:
said by article :The visuals and the payloads are tailored to match the visitors computing environment,
but the social-engineering tricks are identical and are specifically designed to snare unwitting victims.
There you have it: the summation of malware attacks in two simple sentences
said by article :Apple, Google, and Microsoft should be working together to respond to this problem, but that doesnt appear to be happening.
Since Win9x days, I've not known any security minded person who depends on the vendor to keep one's system secure.
Oh, sure, we know that there will be patches and fixes, and we expect them; but what to do in the meantime? At the height of the PDF exploits, for example, Adobe often delayed several weeks before issuing a patch.
And the contrary: Microsoft had a patch for MS08-067 in late 2008. Yet a month or so later, the Conficker worm emerged from its cocoon and successfully exploited -- yep you guessed it -- MS08-067, and went on to become the largest botnet at that time.
Conficker Worm: Help Protect Windows from Conficker
»
technet.microsoft.com/en ··· dd452420On November 21, 2008, the MMPC identified Worm:Win32/Conficker.A. This worm seeks to propagate itself by exploiting the vulnerability addressed in MS08-067 through network-based attacks.
Two months later, Microsoft was pleading (encouraging) users to install the patch:
January 22, 2009: MS08-067 Conficker Worm Update
»
blogs.technet.com/b/msrc ··· ate.aspxWe continue to encourage customers to deploy the Security Update for Microsoft Security Bulletin MS08-067 update as soon as possible
So, in spite of the vendors' efforts, many users ignore the patches/updates anyway!
In those cases of delayed patches, those who know what exploits do (install trojan executables) already have protection in place, so that the patch, while nice to have, is really irrelevant in terms of providing real time protection.
Patches, updates, are always after the factThat covers the remote code execution stuff.
said by article :...new victims are showing up on Apples support forums every day looking for help. In a cursory search yesterday, I found more than a dozen fresh reports of infections by the latest Mac Shield variant.
This, of course, is a social engineering attack. Should we feel more sorry for Mac users than Windows users who have fallen for the same rogue security product trick?
said by article :Computer crime is a problem that affects all of us, regardless of what platform we use. We are all being targeted by gangs that are depressingly effective.
Everyone I've known who help home users stress this basic security axiom: be prepared for the common attack vectors and let the vendors take care of themselves. The Cat-and-Mouse game dictates that there will always be ways to exploit the users, no matter the OS and applications that brag they are more secure than the competition. This applies to both attack vectors.
Well, back to the assertion,
Why Windows users should care about malware on Macs
What's next: Why Opera users should care about exploits against Sea Monkey?
All computer users, no matter the platform/application, should be concerned about cybercrime. To focus on specific targets misses the overall threat which targets ignorance. I don't use that term in a derogatory sense, just stating a fact: most users are ignorant (unaware) of how the two basic attack vectors work.
As I've written before, the most effective way, IMO, is to work one-on-one with those in our sphere of influence who will listen.
For the others, well, what can one say? It's a cruel world out there, if you let yourself be caught up in it.
regards,
-rich