Custom Search

Apple users need to watch out for new threat: Palo Alto Networks

Singapore, November 25, 2014: Global  leader in enterprise security, Palo Alto Networks,  has announced the  discovery of a new family of Apple OS X and iOS malware exhibiting characteristics unseen in any previously documented threats targeting Apple platforms.
This new family, dubbed WireLurker, marks a new era in malware across Apple’s desktop and mobile platforms, representing a potential threat to businesses, governments and Apple customers worldwide.
WireLurker represents:

  • The first known malware family that can infect installed iOS applications similar to how a traditional virus would
  • The first in-the-wild malware family that can install third-party applications on non-jail broken iOS devices through enterprise provisioning
  • Only the second known malware family that attacks iOS devices through OS X via USB
  • The first malware family to automate generation of malicious iOS applications through binary file replacement
    WireLurker malware was discovered by Claud Xiao of Unit 42, the Palo Alto Networks threat intelligence team, and detailed in  this  report:  “WireLurker: A New Era in OS X and iOS Malware.

"WireLurker is unlike anything we’ve ever seen in terms of Apple iOS and OS X malware. The techniques in use suggest that bad actors are getting more sophisticated when it comes to exploiting some of the world’s best-known desktop and mobile platforms..”

Ryan Olson, Intelligence Director, Unit 42, Palo Alto Networks

Following its initial observation in the wild in June by a developer at Tencent, Palo Alto Networks researchers have determined WireLurker’s potential impact, assessed the methods available to prevent, detect, contain and remediate the threat, and detailed the protections available for Palo Alto Networks customers.
Access the tool to detect the WireLurker malware family on OS X here:


Post Your Comments Now
Apple users need to watch out for new threat: Palo Alto Networks
by Rafo on October  22,  2015
  "Есть еще вариант при установке palo-suite: отредактировать файл palo.ini (находится в каталоге palo suitepalodata )Пример правильного файла:user-loginlog ....logolap_seervr.loghttp 7921http 7922verbose infosplash-limit 1000 500 100goalseek-limit 1000goalseek-timeout 10000cache-barrier 100000clear-cache-cells 10000В нем говорится о том, что для локального соединения (local host или используется порт 7921, а для внешнего соединения (адрес в сети: использовать другой порт 7922.Предыдущий вариант был описан под установку palo seervr + client (то, что Вы устанавливали на другом компьютере и где сказали не устанавливать сервер )"