Home / / Trojan found lurking in Apple iWork 09 torrent

Trojan found lurking in Apple iWork 09 torrent

Users warned to avoid downloading file disguised as trial version of Apple’s office productivity software

A new Trojan has been uncovered in torrent files disguised as a trial version of Apple’s iWork 2009 office productivity suite.

The file, which is currently being shared on BitTorrent and can potentially appear on other popular torrent sites, is named ‘iWork09.zip’. The seemingly harmless name tricks users into believing that it’s a legitimate version, even though Apple’s real trial file is named ‘iWork09Trial.dmg’.

According to security specialists at Symantec, the downloaded file works by changing the main installation script to run the right software package along with another malicious package called iWorkServices.pkg, which unloads malicious code that connects the users to a remote system.

Once connected, cyber criminals can access the infected Mac to obtain sensitive information, steal passwords and other information that a user types using keylogging techniques, and even spy on a user’s internet activity.

While the threat is still categorized as ‘low’, the economic crisis could force more people to use pirated software instead of paying for legitimate versions.

If users want to try the latest edition of Apple’s iWork software, they are advised to go through the company website.

Follow us to get the most comprehensive technology news in UAE delivered fresh from our social media accounts on Facebook, Twitter, Youtube, and listen to our Weekly Podcast. Click here to sign up for our weekly newsletter on curated technology news in the Middle East and Worldwide.

REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.