Posted on 04/10/2012 12:04:43 PM PDT by dickmc
~~~~~~~~~
To see if your Mac is infected:
In Terminal:
go to SHELL / New Command
paste in the bold line below
defaults read /Applications/Safari.app/Contents/Info LSEnvironment
-- and RUN.
You should get this error:
The domain/default pair of (/Applications/Safari.app/Contents/Info, LSEnvironment) does not exist
Then run:
defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
You should get this error:
The domain/default pair of (/Users/YOURUSER/.MacOSX/environment, DYLD_INSERT_LIBRARIES) does not exist
If you do, you are clean of this variant!
~~~~~~~~~~~
(Can't hurt anything; those are read-only commands...)
So a company that supposedly specializes in computer security actually is the perpetrator in this attempt to attack Macs... at least that is what this all appears to boil down to. They have been caught red handed, Apple is trying to force a shutdown of the servers playing “host” to the attack attempts.
I still say Symantec, McAfee, and others have done similar... a good way to generate business (tinfoil hat is firmly in place).
And as I have read many articles on this supposed “widespread infection” - I have actually found no actual userland reports of said infection, but lots of paranoia.
Historically, Apple hasn’t had a very good relationship with security researchers. Most companies don’t. It took a long time for Microsoft to wake up and realize they essentially constitute free security research for the company.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.