Hours after Apple owned up to a fake security software scam campaign, the "scareware" gang released a new variant, with a new name and a streamlined installation process that doesn't prompt victims for their password, a French antivirus firm said today.
"Given the timing, and the new name, it does seem like this was their reaction to Apple's support document," said Peter James, a spokesman for Intego, a maker of Mac-specific security software.
[ Also on InfoWorld: 5 ways to stay safe from fake anti-virus malware attack on Macintosh. | Discover the key Mac, iOS, and Apple tech trends for business users. Read InfoWorld's Technology: Apple newsletter. ]
On Tuesday, Apple acknowledged the threat posed by what security experts call "scareware" or "rogueware." bogus security software that claims a computer is heavily infected with worms, viruses and other malware. Once installed, such software nags users with pervasive pop-ups and fake alerts until they fork over a fee to purchase the worthless program.
Apple also said it would update Mac OS X, adding the ability of the operating system to detect and delete the Mac Defender scareware.
The group responsible for Mac Defender -- and other earlier variants named Mac Protector and Mac Security -- must have read the news, said James.
"They changed the name to Mac Guard, and released it today, maybe just to give Apple the finger," James said.
The cyber criminals also changed the way they distribute the fake security program, breaking it into two parts: a small downloader, dubbed "avRunner," which once on a Mac reaches out to a hacker-controlled site to download the phony MacGuard security software.
But the new version also includes a more important twist.
"Unlike the previous variants, no administrator password is required to install the downloader," said James. "People will still see an installer screen -- [the attackers] haven't gotten to the point where they're completely avoiding that yet -- but all one needs to do to install is click 'OK' a couple of times. So it's one less hurdle."
avRunner sidesteps the need for an administrator password by putting itself directly in the Applications folder of a victimized Mac. Unlike a legitimate installer package -- or an illegitimate one for that matter -- putting an executable in the Applications folder doesn't require a password when the user is the administrator.
With avRunner safely added to the Applications folder, it then grabs MacGuard from a remote server.
"A lot of the comments on blogs said 'Stupid Apple users, it's their own fault' because they were entering their [administrator] password," said James. "[The hackers] are now saying, 'Well, we don't even need to get a password.'"
James said that clues in the scareware point to Eastern European or Russian hackers as behind the Mac Defender/MacGuard campaign. Last week, Microsoft's malware engineers found links between the Mac scam and a fast-growing one that targets Windows users, and concluded that the same gang is responsible for both.
"These are smart people," said James. "There's nothing new here that Windows users haven't seen, but this group has a couple of very good Mac developers."
Mac users running Safari can stop avRunner from automatically opening its installer screen by unchecking the box marked "Open 'safe' files after downloading" at the bottom of the General tab in the browser's Preferences screen.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed. His email address is email@example.com.
Read more about security in Computerworld's Security Topic Center.