订阅

多平台阅读

微信订阅

杂志

申请纸刊赠阅

订阅每日电邮

移动应用

专栏 - 苹果2_0

全球55万Mac中毒,苹果补丁姗姗来迟

Philip Elmer-DeWitt 2012年04月09日

苹果(Apple)公司内部流传着一个老笑话,那就是史蒂夫·乔布斯周围是一片“现实扭曲力场”:你离他太近的话,就会相信他所说的话。苹果的数百万用户中已经有不少成了该公司的“信徒”,而很多苹果投资者也赚得盆满钵满。不过,Elmer-DeWitt认为,在报道苹果公司时有点怀疑精神不是坏事。听他的应该没错。要知道,他自从1982年就开始报道苹果、观察史蒂夫·乔布斯经营该公司。
跟微软Windows系统相比,苹果电脑的操作系统很少感染病毒,但该操作系统的运行环境是Java。

Flashback木马影响范围。    来源:反病毒公司Dr.Web。

    苹果操作系统安全性相对较高,我已经就该主题发表过几篇文章,也从PC用户那里获得了很多这样的反馈【参见《为什么苹果电脑不会中病毒》(Why are there no Mac viruses)】。因此,我觉得有必要告诉大家,苹果操作系统目前似乎正在经历迄今为止最为严重的恶意软件攻击。

    根据俄罗斯大蜘蛛防病毒软件公司(Dr.Web)上周三发布的一份报告,称Flashback木马已经对全球范围内超过55万台Mac电脑的安全造成了威胁。

    Dr. Web已经针对微软Windows系统若干种版本的Flashback木马提供了杀毒程序。它对苹果电脑遭遇的木马病毒变种描述如下:

    这种病毒变种会用Java语言代码来装载包含漏洞利用(exploit)的Java小应用程序,然后把可执行文件保存至中毒的Mac电脑硬盘。病毒利用该文件从远程服务器下载恶意负载并启动。依照从服务器获取的指令,它能获取并运行任何可执行文件。

    甲骨文公司(Oracle)在2010年收购太阳微系统公司(Sun Microsystems)后承担了Java程序语言的责任,并于今年2月份发布了漏洞更新。科技博客Ars Technica的程雅基称:“Flashback最新变种的消息流传开之后,苹果公司直到上周初才发布了补救措施。”

    i该补救措施是苹果操作系统软件更新Java for OS X 2012-001的一部分。用户可以在“系统设置”下的“软件更新”中找到。如果要检查自己的Mac是否中毒,可以根据 F-Secure杀毒软件的查毒指南,使用“实用程序文件夹”的“终端应用软件”来排查木马:

    Having written several times -- and taken a lot of heat from PC users -- about the relative security of Apple's (AAPL) operating systems (See Why are there no Mac viruses), I feel obliged to report that Mac OS X is under what appears to be the most serious malware attack to date.

    According to a report posted Wednesday by Dr. Web, a Russian anti-virus vendor that may have a stick in this fire, the security of more than 550,000 Macs around the world have been compromised by the Flashback trojan.

    Dr. Web, which sells an antidote for the versions of Flashback that run on Microsoft (MSFT) Windows machines, describes the Mac variant like this:

    JavaScript code is used to load a Java-applet containing an exploit... The exploit saves an executable file onto the hard drive of the infected Mac machine. The file is used to download malicious payload from a remote server and to launch it...It may get and run any executable specified in a directive received from a server.

    Oracle (ORCL), which assumed responsibility for the Java programming language when it acquired Sun Microsystems in 2010, released a fix for the vulnerability in February. According to Ars Technica's Jacqui Cheng, "Apple didn't send out a fix until earlier this week, after news began to spread about the latest Flashback variant."

    The fix is part of the OS X software update called Java for OS X 2012-001. You'll find it in Software Update in System Preferences. If you think one of your Macs is infected, F-Secure has instructions on how to use the Terminal application in your Utilities folder to find out:

本电脑经查无病毒     来源:科技博客网站Ars Technica

    最新消息:上周三下午,大蜘蛛防病毒软件公司的恶意软件分析师在社交网站Twitter上宣布:受到感染的Mac数量已经上升至60万台。

    译者:李玫晓/汪皓

    UPDATE: According to an update posted on Twitter Wednesday afternoon by a Dr. Web malware analyst, the number of infected Macs has reached 600,000.

我来点评

  最新文章

最新文章:

中国煤业大迁徙

500强情报中心

财富专栏