In 2013 alone @kaspersky detected ~1700 malware samples for OS X

.../...

So what exactly gets caught?

Well, in the first eight months of this year we detected nearly a thousand unique attacks on Macs, grouped into 25 major families. A few words on the most interesting:

  • Backdoor.OSX.Callme ?? spreads in the body of a specially crafted MS Word document, which when launched installs a backdoor in the system via a vulnerability. This gives the attacker remote access to the system. At the same time it steals contact lists, apparently to search for new victims.
  • Backdoor.OSX.Laoshu ?? it takes screenshots once a minute. It was signed with a trusted certificate of the developer. It looks like the virus writers were planning on uploading it to the App Store.
  • Backdoor.OSX.Ventir ?? a multi-modular Trojan-spy with hidden remote control. It contains a keylogger based on open sourced logkext driver.
  • Trojan.OSX.IOSinfector ?? installer of the mobile version of Trojan-Spy.IPhoneOS.Mekir (OSX/Crisis) ?? yup, it infects iPhones.
  • Trojan-Ransom.OSX.FileCoder ?? the first file encryptor for OS X. Only just working ?? a buggy prototype.
  • Trojan-Spy.OSX.CoinStealer ?? the first bitcoin-stealing malware for OS X. Disguises itself as a few open source bitcoin utilities. What it really does is install a malicious browser extension and/or a patched version of bitcoin-qt (an open source utility for mining bitcoins).
  • #malware for OS X you??ve never heard about (but might find on your Mac)

.../...