<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>As noted by <a href="http://www.theregister.co.uk/2012/07/25/mac_crisis_malware/">The Register</a> and other places, there's a new cross-platform vulnerability out that installs via a piece of Java that does <a href="http://nakedsecurity.sophos.com/2012/07/25/mac-malware-crisis-on-mountain-lion-eve/">a check for "Windows or Mac"</a> and then installs the malware suitable for the platform.</p> <!--more--><p>The Mac malware it installs, called either OSX/Morcut or OSX/Crisis - depending on the AV researcher - is most easily detected and blocked by seeing where it tries to go. <a href="http://www.intego.com/mac-security-blog/new-apple-mac-trojan-called-osxcrisis-discovered-by-intego-virus-team/">Intego reports</a> that it calls home every 5 minutes to a single IP address (176.58.100.37) to get instructions and upload anything it may have found.</p> <p>ThreatSTOP has added this IP address to our feeds and so all ThreatSTOP customers are protected from this malware. Our reporting tool will report the internal IP addresses that are attempting to contact this host, making it easy for IT departments and network administrators to identify and then remediate infected machines.</p> <p>If you aren't familiar with <a href="http://www.threatstop.com/">ThreatSTOP</a> then consider a trial on your firewall. ThreatSTOP's IP reputation service provides a way for firewalls to block currently active criminal IP addresses. The list is updated automatically and applies to both inbound and outbound traffic, such as the traffic to known botnet command &amp; control servers.</p></span>