More details from A mac IT Nerd.
I stumbled across a forum (shadowmac I think), where the participants were cobbling this together while I was googling failure conditions on the ARD exploit.
Social engineering is needed to get Trojan downloaded and for first run on target computer, in this case the run part is handled by a fake applescript warning concerning broken pref panes with a 'should I repair?' style pop up at login/app run.
Uses the recent ARD exploit to gain root access to box and enable services, swiss cheese the firewall etc, does not require user to enter any password.
Full exploit will only work if:
User that activates it is logged into GUI *AND* ARD has not been set up.
So simply turn Apple Remote Desktop on and set access privileges for a user in the sharing prefs to disable the exploit.
Hopefully there will be a patch for this rather embarrassing vulnerability shortly.
- Review Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
- Vid CEO Tim Cook sweeps Apple's inconvenient truths under a solar panel
- HTC mulls swoop for Nokia's MASSIVE Chennai plant
- Asteroids as powerful as NUCLEAR BOMBS hit Earth TWICE a YEAR
- Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor