Yesterday we published a whitepaper introducing WireLurker, the first malware attacking both non-jailbroken and jailbroken iOS devices from a Mac OS X system. Shortly after we released the paper, Jaime Blasco from AlienVault Labs notified us that he’d found a Windows executable file that contains WireLurker’s command and control server address. We analyzed and investigated the sample and have confirmed that it is an older version of WireLurker.
more here..........http://researchcenter.paloaltonetworks.com/2014/11/wirelurker-windows/
more here..........http://researchcenter.paloaltonetworks.com/2014/11/wirelurker-windows/