Antivirus firms first reported the malware, dubbed "Boonana," on Wednesday when Intego and SecureMac, two Mac-only security vendors, warned Mac OS X users that the worm was aimed at them.
Boonana spreads via messages posted to social networking or microblogging sites. Those messages bait the trap with the subject "Is this you in the video?" and a link to a malicious site. People who bite and click the link are then prompted to run a Java applet.
That applet is key to the malware's cross-platform capabilities, said Symantec in a note posted to its research blog .
"The [malware] is written in Java, which is a platform independent language," said Symantec researcher Jeet Morparia. "Individual modules contain Java compiled files, which are packaged in a Java runtime executable. As long as a computer has the Java Runtime Environment (JRE) installed on it, which is often the case across all the platforms, the threat can execute itself."
Intego and Symantec noted that the worm includes several components, including an IRC connector used by the hacker to issue commands to hijacked computers, a keylogger to steal usernames and passwords, and a rootkit to hide it from security software.
Functionally, Boonana works the same as the better-known Koobface Windows worm. Koobface has been actively infecting Windows PCs for more than two years, although virulent forms used in large-scale attacks didn't appear until early 2009.
Koobface, an anagram of Facebook , is best-known for infecting PCs through spammed messages on the giant social networking service.
According to Symantec, Boonana includes a component that reads browser cookies of users logged into Facebook, then posts additional bogus messages and links on the site using those Facebook accounts.
A Facebook spokesman downplayed the threat, saying in an e-mail reply to a request for comment that it was a "small-scale attack." As is its practice, Facebook has blocked access to accounts compromised by Boonana in an attempt to quell the malware outbreak.
Marc Fossi, the director of Symantec's security response team, echoed Facebook, saying that his group had tracked a number of infection attempts, but that the number was "not in epidemic proportions."
The important element in Boonana, Fossi continued, is its cross-platform infection ability, courtesy of Java, which is installed on many Windows, Mac and Linux machines. Such threats are rare, he added, as he cited the one example he was familiar with. "I recall [just] one piece of malcode from a few years back that affected Windows and OS X, but I believe it was proof of concept and didn't really go anywhere," he said.
Mac OS X has bundled an Apple-maintained version of Java for years, but last week the company announced it was "deprecating," or dropping it, from OS X. Java is also out as a development platform for the upcoming Mac App Store, according to Apple's guidelines, and will probably not find a home in the next version of Mac OS X, dubbed "Lion" by CEO Steve Jobs during a sneak peak on Oct. 20.
For Dino Dai Zovi, a noted Mac vulnerability and exploit researcher -- and the co-author of the Mac Hacker's Handbook -- Apple's ditching Java can't come too soon.
"Most Mac users do not need or even use Java, and [deprecating it] will make them safer than having a large window of vulnerability in a plug-in that is being actively attacked in the wild through exploits that can easily be adapted to target Mac OS X," Dai Zovi said in an e-mail reply to questions about Java.
"It's not worth the risk of having it enabled," he added.
Fossi agreed. "It probably isn't a bad idea" for Apple to drop Java, he said.
Apple's operating system rival has said it's seen an "unprecedented wave" of Java exploits in the last nine months. Last week, Microsoft's malware group announced that Java exploits had skyrocketed recently, booming from less than half a million in the first quarter of 2010 to more than 6 million in the third quarter.
Robert McMillan of the IDG News Services contributed to this story.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org .
Read more about security in Computerworld's Security Topic Center.
This story, "Koobface worm targets Mac users on Facebook, Twitter" was originally published by Computerworld.