> From: Martin Hill <[EMAIL PROTECTED]>
>> (2) unpack the tar.gz
>> (3) run the shell script that is inside
> 
> I understand these steps all happen automatically without requiring human
> intervention.  I don't think it negates the self-replicating dangers of the
> beast.

Actually, thinking more about this (not being an iChat user much myself),
you probably are correct on this count, the user would have to double-click
the compressed file and then open the terminal script file manually with
current versions of Mac OS X.  I would hope Auto-decompress and auto-open
shouldn't be enabled with iChat and the de-compression engine these days!

As such you would hope this would give many users a warning that this is no
ordinary file, but no password will be required normally and the
self-replication vector is still there so I think this is still a serious
issue.
 
>> (4) type in an administrator password when the shell script asks for it.
> 
> It also does NOT require a password if your account has admin privileges
> (root privileges NOT required).  Most Mac users I know are running with
> admin privileges enabled (the default option when OS X is installed) so they
> won't have the warning of having to type in a pwd.
>  
>> hardly a virus ,
> 
> As various commentators have indicated, it is really a blended threat:
> "Leap.A (CME-4) acts like a combination of a Trojan, virus and worm. It acts
> like a Trojan because it masquerades as a JPEG file, a virus because it
> attempts to infect executables, and a worm because it attempts to send
> copies of itself to others via iCHAT. This last action is similar to that of
> an instant messaging worm on the Windows platform."
> 
> I wouldn't brush it off quite so quickly, particularly as it now provides a
> platform for more nasties to use as a base to do worse things.
> 
>> Malware..?, yes its malicious but not destructive,
> 
> Corrupting any application you run is not destructive?  It may not be as
> nasty as deleting your home directory, but it still qualifies as destructive
> in my book.
> 
>> it 
>> requires so much user interaction, it looks like more of a social
>> engineering exercise or a proof of concept like opener was.
> 
> The only user interaction it requires is to accept the download of the file
> in iChat from what I've read.  If your trusted buddy on iChat sends you what
> looks like a jpeg file with the title "Mac OS X 10.5 screen shots" the
> chances are you will click accept.  Yes?  We're not talking email from some
> unknown source here.
> 
>> thoughts?
> 
> I've been the first to set the record straight on false Mac virus scares in
> the past, but it doesn't mean we should necessarily take this one lightly.
> 
> The stats still stand at the following:
> 
> Microsoft Windows:
> Viruses and Worms = 140,000 (Symantec Security Focus)
> Spyware and Adware programs = 78,000 (www.pestpatrol.com)
> Burrowers = 40 (www.pestpatrol.com)
> 80% of PCs infected with spyware (webroot.com)
> 2004 alone:
> -  500 new Trojans (www.pestpatrol.com)
> -  500 new keyloggers (www.pestpatrol.com)
> -  1,287 new adware apps (www.pestpatrol.com)
> -  7,360 new viruses and worms (symantec.com)
> 
> Mac OS X:
> Viruses and Worms = 1
> Spyware programs = 0
> Adware = 0
> Keyloggers = 0
> Burrowers = 0
> Trojans = 3  (symantec.com)
> 2004:
> -  1 Rootkit (symantec.com)
> 
> With many of the thousands of Windows viruses and worms being far more
> nasty compared to this fairly innocuous Mac worm, it is by no means the end
> of the world, but this is nonetheless the first truly credible
> self-propagating threat to OS X.  I think we should finally start looking at
> firming up our malware strategies on the Mac just to be safe.
> 
> -Mart
>  
>> cheers
>> 
>> Nat
>> 
>> On Feb 17, 2006, at 9:18 AM, Martin Hill wrote:
>> 
>>> Well it has finally happened after all these years of commentators
>>> crying
>>> wolf.
>>> 
>>> The first bit of malware that attempts to spread itself to other Mac
>>> users
>>> has finally arrived on the scene.  Note this is not technically a
>>> virus as
>>> many articles are saying but it is also not just a simple trojan as
>>> some Mac
>>> users are saying.
>>> 
>>> To get infected a user has to click on what looks like a jpeg file in a
>>> message sent through Apple's iChat program so it requires user
>>> intervention,
>>> but as it then attempts to infect other applications - they get
>>> corrupted
>>> due to a bug.  It then attempts to send copies of itself to all users
>>> in the
>>> buddy list of the infected user if they use the iChat software.
>>> 
>>> This malware also does not require the affected user to enter a
>>> password if
>>> they are an admin user (or if they are a root user) - it only asks for
>>> a
>>> password if they have been intentionally set up as a user without admin
>>> privileges.  As a default install of OS X automatically gives the main
>>> user
>>> admin privs, most users will not be asked for a password as this worm
>>> installs itself.
>>> 
>>> Although it does not delete files or do any other nasty things, it
>>> looks
>>> like other nasty hackers could modify this initial code to cause more
>>> damage.
>>> 
>>> Looks like we had all finally better start installing and using
>>> anti-virus
>>> software on our Macs (particularly if you use (Apple's iChat software).
>>> 
>>> Symantec's Description of this worm (which they call "OSX.Leap.A" also
>>> known
>>> as the "Oompa Loompa" worm):
>>> http://securityresponse.symantec.com/avcenter/venc/data/osx.leap.a.html
>>> 
>>> The stats still stand at the following:
>>> 
>>> Windows Viruses/worms = 140,000
>>> Mac OS X worms = 1
>>> 
>>> With many of the thousands of Windows viruses and worms particularly
>>> nasty
>>> compared to this fairly innocuous Mac worm, it is by no means the end
>>> of the
>>> world, but this is nonetheless the first truly credible threat to OS X.
>>> 
>>> Here are the details from MacFixit:
>>> http://www.macfixit.com/article.php?story=20060216075452766
>>> 
>>> "Protective method: Setting iChat to not automatically accept incoming
>>> files
>>> In order to protect against the unintended acquisition of this
>>> malware, it
>>> is recommended that you set iChat to notify the user before accepting a
>>> file. This is accomplished by opening iChat's preferences, then
>>> clicking the
>>> "Messages" tab, and selecting "Confirm before sending files." This is
>>> the
>>> default setting for a fresh Mac OS X installation.
>>> 
>>> And remember, be very cautious with supplying your administrator
>>> password to
>>> system prompts. You should never be asked to enter your administrator
>>> password to open a .jpg file (as in the above case). Provide your
>>> administrator password only to trusted applications.
>>> 
>>> In fact, you should avoid being logged in as an administrator whenever
>>> possible. Instead, use a standard user account for daily tasks.
>>> 
>>> Andrew Welch of Ambrosia Software has discovered and described a new
>>> piece
>>> of malware for Mac OS X dubbed the "Oompa-Loompa Trojan (OSX/Oomp-A)"
>>> 
>>> The malware was posted as "latestpics.tgz" to a Mac rumors web site,
>>> claiming to be pictures of "Mac OS X Leopard" (an upcoming version of
>>> Mac OS
>>> X.
>>> 
>>> Andrew writes:
>>> 
>>> "When unarchived (it is a gzip-compressed tar file), which can be done
>>> by
>>> simply double-clicking on the file, it appears to be a JPEG file
>>> because
>>> someone pasted the image of a JPEG file onto the file.
>>> 
>>> "After it's been unzipped, tar will tell you there are two files in the
>>> archive:
>>> 
>>>     * ._latestpics
>>>     * latestpics
>>> 
>>> "The ._latestpics is just the resource fork of the file, which
>>> contains the
>>> pasted in custom icon meant to fool people into double-clicking on it
>>> to (in
>>> theory) open the JPEG file for viewing. In actuality, double-clicking
>>> on it
>>> will launch an executable file.
>>> 
>>> "The file 'latestpics' is actually a PowerPC-compiled executable
>>> program,
>>> with routines such as:
>>> 
>>>     * _infect:
>>>     * _infectApps:
>>>     * _installHooks:
>>>     * _copySelf:
>>> 
>>> "A few important points
>>> 
>>>     * This should probably be classified as a Trojan, not a virus,
>>> because
>>> it doesn't self-propagate externally
>>>     * It does not exploit any security holes; rather it uses "social
>>> engineering" to get the user to launch it on their system
>>>     * It requires the admin password if you're not running as an admin
>>> user
>>>     * It doesn't actually do anything other than attempt to propagate
>>> itself
>>> via iChat
>>>     * It has a bug in the code that prevents it from working as
>>> intended,
>>> and has the side-effect of preventing infected applications from
>>> launching
>>>     * It's not particularly sophisticated
>>> 
>>> "Here's what it does if a user double-clicks on the file, or otherwise
>>> executes it:
>>> 
>>>    1. It copies itself to /tmp as "latestpics"
>>>    2. It recreates its resource fork in /tmp (with the custom icon in
>>> it)
>>> from an internally stored gzip'd copy, then sets custom icon bit for
>>> the new
>>> file in /tmp
>>>    3. It then tar + gzips itself so a pristine copy of itself in .tgz
>>> format
>>> is left in /tmp
>>>    4. It renames itself from "latestpics.tar.gz" to "latestpics.tgz"
>>> then
>>> deletes the copied "latestpics" executable from /tmp (This gives it a
>>> pristine copy of itself, for later transmission)
>>>    5. It extracts an Input Manager called "apphook.bundle" that is
>>> embedded
>>> in the macho executable, and copies it to /tmp
>>>    6. If your uid = 0 (you're root), it creates
>>> /Library/InputManagers/ ,
>>> deletes any existing "apphook" bundle in that folder, and copies
>>> "apphook"
>>> from /tmp to that folder; If your uid != 0 (you're not root), it
>>> creates
>>> ~/Library/InputManagers/ , deletes any existing "apphook" bundle in
>>> that
>>> folder, and copies "apphook" from /tmp to that folder
>>>    7. When any application is launched, Mac OS X loads the newly
>>> installed
>>> "apphook" Input Manager automatically into its address space (This
>>> allows it
>>> to have the code in the "apphook.bundle" injected into any subsequently
>>> launched application via the InputManager mechanism)
>>>    8. When an application is subsequently launched, the
>>> "apphook.bundle"
>>> Input Manager then appears to try to send the pristine
>>> "latestpics.tgz" file
>>> in /tmp to people on your buddy list via iChat (who will then
>>> presumably
>>> download the file, double-click on it, and the cycle repeats) (It
>>> looks like
>>> the author intended to get it to send the "latestpics.tgz" file out via
>>> eMail as well, but never got around to writing that code) -- This lets
>>> it
>>> send itself to people on your buddy list via iChat; this appears to be
>>> the
>>> only way it self-propagates externally
>>>    9. It then uses Spotlight to find the 4 most recently used
>>> applications
>>> on your machine that are not owned by root
>>>   10. In an apparent "Charlie and the Chocolate Factory" reference, it
>>> then
>>> checks to see if the xattr 'oompa' of the application executable is >
>>> 0...
>>> if so, it bails out, to prevent it from re-infecting an already
>>> infected
>>> application
>>>   11. If not, it sets the xattr 'oompa' of the application executable
>>> to be
>>> 'loompa' (this does nothing, it is just a marker that it has infected
>>> this
>>> app)
>>>   12. It then copies the application executable to its own resource
>>> fork,
>>> and replaces the executable with itself -- It has thus effectively
>>> injected
>>> its code in the host application
>>>   13. When an application is launched from then on, the trojan code is
>>> executed, and it tries to re-infect and re-propagate every time that
>>> application is launched
>>>   14. It then does an execv on the resource fork of the executable,
>>> which is
>>> the original application, so the application launches as it normally
>>> would
>>> (in theory... see below)
>>> 
>>> [...]
>>> 
>>> "In the end, it doesn't appear to actually do anything other than try
>>> to
>>> propagate itself via iChat, and unintentionally prevent infected
>>> applications from running
>>> 
>>> "It seems that this is more of a 'proof of concept' implementation that
>>> could be utilized to actually do something in the future, depending on
>>> how
>>> successful it is, or it was simply done to garner attention/press.
>>> Which I'm
>>> sure it'll get.
>>> 
>>> As noted by Andrew, this particular piece of malware requires
>>> user-initiated
>>> action to run, and also requires the user to enter an administrator
>>> password
>>> (if you are logged in as a non-admin user) -- something that should
>>> never be
>>> required for opening a .jpg file. Its effects also seem to be
>>> innocuous."
>>> 
>>> -Mart
>>> 
>>> 
>>> 
>>> 
>>> -- The WA Macintosh User Group Mailing List --
>>> Archives - <http://www.wamug.org.au/mailinglist/archives.shtml>
>>> Guidelines - <http://www.wamug.org.au/mailinglist/guidelines.shtml>
>>> Unsubscribe - <mailto:[EMAIL PROTECTED]>
>>> 
>>> WAMUG is powered by Stalker CommuniGatePro
>> 
>> 
>> -- The WA Macintosh User Group Mailing List --
>> Archives - <http://www.wamug.org.au/mailinglist/archives.shtml>
>> Guidelines - <http://www.wamug.org.au/mailinglist/guidelines.shtml>
>> Unsubscribe - <mailto:[EMAIL PROTECTED]>
>> 
>> WAMUG is powered by Stalker CommuniGatePro
>> 
>> 
> 
> 
> 
> -- The WA Macintosh User Group Mailing List --
> Archives - <http://www.wamug.org.au/mailinglist/archives.shtml>
> Guidelines - <http://www.wamug.org.au/mailinglist/guidelines.shtml>
> Unsubscribe - <mailto:[EMAIL PROTECTED]>
> 
> WAMUG is powered by Stalker CommuniGatePro
> 
>