[G4] Virus and Spy Ware detectors

Alex lists at lexial.ca
Wed Jun 22 06:15:58 PDT 2005


On Jun 21, 2005, at 15:33, Paul Moortgat wrote:

> Tha answer from Randy B. Singer (from iomug) is:
>
> The only spyware for the Macintosh has to be physically installed and 
> the
> person installing it has to know the user's password to do so. [...]

On Jun 21, 2005, at 15:47, Ron Steinke wrote:

> Shouldn't you have indicated that the spyware has to be physically 
> installed from the CD and by the user him/herself with the use of the 
> admin password?

(1) The statement quoted by Paul is wrong. With physical access, it is 
perfectly possible to install anything without any password. All you 
have to do is boot the Mac from a CD (which even a novice can make with 
BootCD) or a FireWire drive. It's more difficult if the Open Firmware 
password is enabled, but even that can be bypassed. Basically, if 
someone has physical access to a Mac, you can consider the machine 
compromised.

(2) The notion that spyware or malware can only be installed "from the 
CD" is wrong. The most serious Mac malware so far is Renepo, and it can 
install itself over the LAN. Moreover, it is possible to install 
malware without a password, by piggy-backing on sudo (this is a feature 
common to all Unix systems). Moreover, the Zaptastic exploit has shown 
that, in Tiger, is possible to install malware without a password and 
even without the user being aware.

Having said that, the threat on the Mac is minimal. With a few basic 
steps (such as unchecking the "Open safe files" option), you can be 
reasonably secure -- the stress being on "reasonably".

Finally, there is a common misperception about malware. As soon as 
something goes wrong, many users immediately think, "I have a virus!". 
In fact, even on Win, a bug or configuration problem is much more 
likely than a virus. On Mac, at this point, having a virus or malware 
is like being hit by a meteorite on the head -- it's not impossible, 
but the likelihood is not worth talking about.

<0x0192>



More information about the G4 mailing list