This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

New Mac OS X backdoor trojan "Tsunami" discovered, "sky not falling in"

Share this article:
A trojan targeting Linux users for several years is now setting its sights on the Mac OS X, security researchers warned. 

The so-called “Tsunami” backdoor trojan, detected as OSX/Tsunami.A., is derived from an older Linux malware family that has been around since at least 2002, Robert Lipovsky, researcher at anti-virus company ESET, said in a blog post Wednesday. It enables infected machines to participate in distributed denial-of-service (DDoS) attacks intended to flood websites with traffic.

Once it has made its way onto a system, the malware attempts to connect to an IRC channel, where it can receive further commands. Besides enabling DDoS attacks, it can be used to download additional malware and take control of an affected machine.

Graham Cluley, senior technology consultant at security firm Sophos, said that none of his company's customers have reported their computer infected by Tsunami.

"The sky is not falling in," he said.

Even so, Mac malware is a problem, though much less prevalent than Windows threats, Cluley said in a blog post Tuesday. Last week, for example, researchers discovered a separate Mac trojan, which was crafted to disable the anti-malware protection Apple has built into its OS X platform. 

At the recent McAfee Focus event in Las Vegas researchers demonstrated a live hack of an Apple iPad via SSH.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.