http://www.imore.com/heres-why-most-us-dont-have-worry-about-wirelurker-malware

From: [email protected] 
[mailto:[email protected]] On Behalf Of John Robinson
Sent: Thursday, November 06, 2014 7:18 AM
To: Topics related to Apple and Macintosh computers
Subject: Re: [MacGroup] Is this Real?

Thanks so much Ed, had found a similar article.  Those that pirate software 
deserve what they get.

John

Sent from my iPhone

On Nov 6, 2014, at 7:10 AM, Ed Wiser 
<[email protected]<mailto:[email protected]>> wrote:
http://electronista.feedsportal.com/c/34342/f/625515/s/4033332e/sc/4/l/0L0Smacnn0N0Carticles0C140C110C0A50Ccan0Baffect0Bnon0Bjailbroken0Bios0Bdevices0Bcurrently0Bdistributed0Bthrough0Bunofficial0Bchinese0Bstore0C/story01.htm

—
Sent from Mailbox<https://www.dropbox.com/mailbox>


On Wed, Nov 5, 2014 at 10:02 PM, [email protected]<mailto:[email protected]> 
<[email protected]<mailto:[email protected]>> wrote:
A friend (Windows guy) sent this to me today.  Any truth?  Dangerous?  Remedy?


John



Palo Alto Networks Reveals Discovery of Unprecedented iOS and OS X Malware
Research spotlights new malware family distributed through trojanized and 
repackaged Apple OS applications

SANTA CLARA, Calif., Nov. 5, 2014 /PRNewswire/ -- Palo Alto Networks® (NYSE: 
PANW), the leader in enterprise security, today announced discovery of a new 
family of Apple OS X and iOS malware exhibiting characteristics unseen in any 
previously documented threats targeting Apple platforms. This new family, 
dubbed WireLurker, marks a new era in malware across Apple's desktop and mobile 
platforms, representing a potential threat to businesses, governments and Apple 
customers worldwide.

Among its defining characteristics, WireLurker represents:

  *   The first known malware family that can infect installed iOS applications 
similar to how a traditional virus would
  *   The first in-the-wild malware family that can install third-party 
applications on non-jailbroken iOS devices through enterprise provisioning
  *   Only the second known malware family that attacks iOS devices through OS 
X via USB
  *   The first malware family to automate generation of malicious iOS 
applications through binary file replacement

WireLurker malware was discovered by Claud Xiao of Unit 42, the Palo Alto 
Networks threat intelligence team, and detailed in a report released today, 
"WireLurker: A New Era in OS X and iOS Malware."

Following its initial observation in the wild in June by a developer at 
Tencent, Palo Alto Networks researchers have determined WireLurker's potential 
impact, assessed the methods available to prevent, detect, contain and 
remediate the threat, and detailed the protections available for Palo Alto 
Networks customers.

Palo Alto Networks has released signatures to detect all WireLurker Command & 
Control communication traffic. It is recommended that customers using OS X or 
iOS devices deploy a strict policy for blocking WireLurker traffic using the 
Palo Alto Networksenterprise security platform. A full list of system 
recommendations, remediation techniques and best practices is included in the 
WireLurker report.

QUOTE:

  *   "WireLurker is unlike anything we've ever seen in terms of Apple iOS and 
OS X malware. The techniques in use suggest that bad actors are getting more 
sophisticated when it comes to exploiting some of the world's best-known 
desktop and mobile platforms. As such we have provided full protection to Palo 
Alto Networks customers and published a detailed report so others can assess 
the risk and take appropriate measures to protect themselves."
– Ryan Olson, Intelligence Director, Unit 42, Palo Alto Networks

To learn more

  *   Download WireLurker: A New Era in OS X and iOS Malware
  *   Visit Unit 42, the Palo Alto Networks threat intelligence team, for new 
research, updates and confirmed speaking appearances
  *   Read regular research and analysis on the Unit 42 blog

Upcoming Unit 42 Appearances
Unit 42, the Palo Alto Networks threat intelligence team, is made up of 
accomplished cybersecurity researchers and industry experts. Unit 42 gathers, 
researches and analyzes up-to-the-minute threat intelligence, sharing insights 
with Palo Alto Networks customers, partners and the broader community to better 
protect organizations. Unit 42 team leads regularly appear at industry 
conferences throughout the world. In November, Unit 42's regular roadshow will 
make three stops in Canada:

  *   Tuesday, Nov. 18 in Toronto, Ont.
  *   Wednesday, Nov. 19 in Calgary, Alberta
  *   Thursday, Nov. 20 in Vancouver, B.C.

ABOUT PALO ALTO NETWORKS
Palo Alto Networks is leading a new era in cybersecurity by protecting 
thousands of enterprise, government, and service provider networks from cyber 
threats.  Unlike fragmented legacy products, our security platform safely 
enables business operations and delivers protection based on what matters most 
in today's dynamic computing environments: applications, users, and content.  
Find out more at www.paloaltonetworks.com<http://www.paloaltonetworks.com>.

Palo Alto Networks and the Palo Alto Networks Logo are trademarks of Palo Alto 
Networks, Inc. in the United States and in jurisdictions throughout the world. 
All other trademarks, trade names or service marks used or mentioned herein 
belong to their respective owners.
- See more at: 
http://investors.paloaltonetworks.com/phoenix.zhtml?c=251350&p=irol-newsArticle&ID=1986420#sthash.hmLjPdhc.dpuf



_______________________________________________
MacGroup mailing list
[email protected]<mailto:[email protected]>
http://www.math.louisville.edu/mailman/listinfo/macgroup
_______________________________________________
MacGroup mailing list
[email protected]
http://www.math.louisville.edu/mailman/listinfo/macgroup

Reply via email to