The great Mac debate

2006-08-01

Graham Cluley

Sophos, UK
Editor: Helen Martin

Abstract

'You could be killed in either Bournemouth or Baghdad, but I know which destination I would be more concerned about.' Graham Cluley, Sophos, UK


I've just suffered a distributed denial-of-service attack. Not from a network of zombie computers under the control of an uber-hacker, but my inbox is creaking under the weight of the abusive email I have received from around the world.

The reason is that I dared to say something publicly that previously I've only said behind closed curtains, amongst trusted friends and family – something that has really, really annoyed some people: 'Have you thought about buying an Apple Mac instead?'

Yes, I hold my hands up. I dared to say the thing that a fair few in the security industry have appeared reluctant to say: there's an awful lot of malware for Windows, but hardly anything for Mac OS X.

I was spurred to say the unthinkable by some new research conducted by SophosLabs. An examination of the top malware seen at our global network of monitoring stations in the first half of 2006 found it was all Windows-specific. Not only that, but some of the biggest culprits (like the Netsky and Zafi worms) have been spreading successfully for a couple of years now. What's most interesting about these statistics, however, is what doesn't appear in the list. Apple Macintosh malware is nowhere to be seen. None of the malware in the chart can infect computers running Mac OS X.

It is still relatively rare for viruses to be written for Apple Macintosh computers. While the first malware for Mac OS X was seen in February 2006, it has not spread in the wild and has not spawned a flurry of other malicious code for Mac.

I like to think that businesses have woken up to the importance of running an up-to-date anti-virus product, and research suggests that most of them are recognising the importance of securing their systems properly. So it must be home users who are being infected by these old viruses. So, what are we going to do about home users like my Aunty Hilda who is never really going to get a grasp of computer security but still wants to email? The anti-virus industry has told users ad nauseum about the importance of running anti-virus, installing firewalls, applying patches and not opening unsolicited attachments. But worms, spyware and pornographic pop-ups are still hitting the average man in the street.

When I suggest to those home users that they might want to consider getting an Apple Mac next time, it is with good reason. My aim is to get them out of the hackers' firing line.

The issue here is analogous to advice the government might give people who are making travel plans. They might tell you that going to Iraq would put you at a greater risk of getting shot than going to the south coast of England, for instance. Yes, you could be killed in either Bournemouth or Baghdad, but I know which destination I would be more concerned about if my loved ones started packing their suitcases.

We’'e tried educating Joe Average about security for the last 20 years and he doesn't want to listen. He's not interested in hearing about the latest remove code execution vulnerability in the handling of WMF graphic files. But saying to users, 'You know, you'd be less prone to getting so many viruses if you used a Mac, because there are hardly any Mac viruses at all', is a message that many people would find easier to grasp.

Mac owners mustn't be complacent about security, of course, and should be sure to follow safe computing practices, but there can be no doubt that the vast majority of attacks are happening on Windows, leaving Mac users relatively unscathed. And that is something that home users may wish to consider if they're deliberating about the next computer they should purchase.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.