If you should "come across" an image of sexy Russian supermodel Irina Shayk, beware. Bad Guys are using R-rated photos of Ms. Shayk to spread Mac malware. Didn’t your mom tell you not to download pictures of naked ladies? But you didn’t listen, did you? It turns out that a group of hackers is taking advantage of that common mistake and snaring Mac users in a malware trap baited with pictures of a topless Sports Illustrated swimsuit model. The lady in question is Russian model Irina Shayk; the malware is OSX/Imuler-B, a Trojan horse, according to Graham Cluley, who blogs for Sophos, a security vendor. If you yield to temptation and click the tainted photo of Ms. Shayk, the malware launches an application that opens a backdoor to your computer and uploads private information to a remote Web server, he says. It can also take screenshots and send them to the server, another security firm found. Although malware that targets Macs isn’t nearly as common as Windows malware, Mac users who think they are immune are simply wrong. The Mac OS is not immune to attack, and one of the main reasons it isn’t targeted more often is that hackers prefer to attack the platform with the most users. And that’s Windows. The increasing popularity of Macs and mobile devices running Apple’s iOS has led to an increase in iOS and Mac attacks. And like attacks directed at Windows, attacks against Macs often use social engineering to snare victims. By social engineering, I mean a ploy that tricks a user into thinking he or she is clicking on a file from a business or person they know, or a trick that plays upon greed (You’ve won $1 million!) or curiosity, or in this case, lust–or at least a desire to see unclothed females. It appears that the malware was first discovered by researchers from Intego, a company that specializes in Mac security. “Two samples were found, both in zip archives: ‘Pictures and the Article of Renzin Dorjee.zip’ and ‘FHM Feb Cover Girl Irina Shayk H-Res Pics.zip.’ In both cases, an application was included among the various files, with an icon making it look like an image,” Intego reported in its security blog. The hackers are taking advantage of a default setting in the Mac OS X Finder, whereby file extensions are not displayed. “Users double-click on the application to launch the malware, which quickly deletes itself, replacing the original application with a real JPEG image corresponding to the one that was an application, and displays this image in the user’s default image viewer. There is no visible trace of the application after this point,” according to Intego’s website. In addition to the usual advice not to click on stuff from people you don’t know, Intego had a very specific tip for Mac users: Go into the Finder’s advanced settings and check the box that allows you to view filename extensions. If you’re curious, you can find out all about Irina Shayk with a simple Google search, but do be careful if you come across a site that promises nude photos of the model. (Image via Irina Shayk’s Facebook page.) Related content brandpost Sponsored by Palo Alto Networks x Accenture Making sense of zero trust - why a managed SASE solution is the ideal option for enterprises Security leaders are turning to SASE as their preferred network security solution amid a new era of cloud-powered businesses working from anywhere. By CIO Contributor Nov 28, 2023 4 mins Network Security feature 8 tips for unleashing the power of unstructured data For most organizations, data in the form of text, video, audio, and other formats is plentiful but remains untapped. Here’s how to unlock business value from this overlooked data trove. By Bob Violino Nov 28, 2023 10 mins Data Mining Data Science Data Management opinion What you don’t know about data management could kill your business Organizations without a solid data management strategy are on a collision course with catastrophe. Unfortunately, that’s most businesses, judging by the fundamental disconnect on the importance of strong data foundations. By Thornton May Nov 28, 2023 6 mins Data Architecture Data Governance Master Data Management brandpost Sponsored by Dell Technologies and Intel® Gen AI without the risks Demystifying generative AI: Practical tips for cost-effective deployment in your organization. By Andy Morris, Enterprise AI Strategy Lead at Intel Nov 27, 2023 6 mins Artificial Intelligence Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe