Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Apple Updates XProtect Security Feature to Block iWorm Malware

Apple has updated its XProtect security feature to block malware an antivirus firm found had compromised thousands of Mac computers.

Apple has updated its XProtect security feature to block malware an antivirus firm found had compromised thousands of Mac computers.

According to researchers at security company Dr. Web, the iWorm malware had infected more than 18,500 OS X machines as of Sept. 29. Many of those computers were located in the United States and Canada.

In response, Apple updated its XProtect anti-malware system to detect variants of the worm, according to

Mac security site ‘The Safe Mac’ reported that the malware infects users via pirated software.

“The moral of the story? Never engage in software piracy,” blogged The Safe Mac’s Thomas Reed. “This single piece of malware is FAR from the only thing you can get infected with while installing stolen software. Torrents and sites like PirateBay should be avoided at all costs. If you cannot afford to pay for a piece of software or a movie or something similar, do without. Downloading such things for free often come with LOTS of strings attached.”

The malware can collect information on infected systems as well as download files, execute system instructions and take other actions. According to Dr. Web, the worm leverages Reddit to get a list of command and control servers.

“The search returns a web page containing a list of botnet C&C servers and ports published by criminals in comments to the post minecraftserverlists under the account vtnhiaovyd,” according to Dr. Web. “The bot picks a random server from the first 29 addresses on the list and sends queries to each of them. Search requests to acquire the list are sent to in five-minute intervals.”

“While establishing a connection to the server whose address is picked from the list using a special routine, the backdoor attempts to determine whether the server address is on the exceptions list and engages in a data exchange with the server to employ special routines for authenticating the remote host,” the Dr. Web post continued. “If successful, the backdoor sends the server information about the open port on the infected machine and its unique ID and awaits directives.”

Technical information about the malware can be found here.

Written By

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...

Malware & Threats

Norway‎-based DNV said a ransomware attack on its ship management software impacted 1,000 vessels.