latestpics.tgz
to contacts on the infected users' buddy list.Update: More from the Washington Post, Slashdot and MacRumours. Andrew Welsh has done some initial disassembly of the worm and posted his results on the Ambrosia Software web boards. The worm apparently uses Spotlight to find the other applications on the infected machine and then inserts a stub code into each executable. Andrew concludes that,
In the end, it doesn't appear to actually do anything other than try to propagate itself via iChat, and unintentionally prevent infected applications from running - Andrew WelshUpdate: More on OSX/Leap.A from F-Secure...
Update: News of the worm has finally made it into the mainstream media...
No comments:
Post a Comment