Home · Maps · About

Home > OTChat

[ Post a New Response | Return to the Index ]

(928652)

view threaded

More than half a million Macs hit with Flashback Trojan

Posted by Olog-hai on Sun Apr 8 00:17:23 2012

edf40wrjww2msgDetailOT:detailStr
fiogf49gjkf0d
BBC News

5 April 2012 | Last updated at 08:54 ET

Half a million Mac computers 'infected with malware'

More than half a million Apple computers have been infected with the Flashback Trojan, according to a Russian anti-virus firm.

Its report claims that about 600,000 Macs have installed the malware — potentially allowing them to be hijacked and used as a "botnet".

The firm, Dr. Web, says that more than half that number are based in the US.

Apple has released a security update, but users who have not installed the patch remain exposed.

Flashback was first detected last September when anti-virus researchers flagged up software masquerading itself as a Flash Player update. Once downloaded, it deactivated some of the computer's security software.

Later versions of the malware exploited weaknesses in the Java programming language to allow the code to be installed from bogus sites without the user's permission.

Remote control

Dr. Web said that once the Trojan was installed, it sent a message to the intruder's control server with a unique ID to identify the infected machine.

"By introducing the code criminals are potentially able to control the machine," the firm's chief executive Boris Sharov told the BBC.

"We stress the word potential as we have never seen any malicious activity since we hijacked the botnet to take it out of criminals' hands. However, we know people create viruses to get money. The largest amounts of bots — based on the IP addresses we identified — are in the US, Canada, UK and Australia, so it appears to have targeted English-speaking people."

Dr. Web also notes that 274 of the infected computers it detected appeared to be located in Cupertino, California — home to Apple's headquarters.

Update wait

Java's developer, Oracle, issued a fix to the vulnerability on 14 February, but this did not work on Macintoshes as Apple manages Java updates to its computers.

Apple released its own "security update" on Wednesday - more than eight weeks later. It can be triggered by clicking on the software update icon in the computer's system preferences panel.

The security firm F-Secure has also posted detailed instructions about how to confirm if a machine is infected and how to remove the Trojan.

Although Apple's system software limits the actions its computers can take without requesting their users' permission, some security analysts suggest this latest incident highlights the fact that the machines are not invulnerable.

"People used to say that Apple computers, unlike Windows PCs, can't ever be infected — but it's a myth," said Timur Tsoriev, an analyst at Kaspersky Lab.

Apple could not provide a statement at this time.


Post a New Response

(928653)

view threaded

Re: More than half a million Macs hit with Flashback Trojan

Posted by SelkirkTMO on Sun Apr 8 00:30:30 2012, in response to More than half a million Macs hit with Flashback Trojan, posted by Olog-hai on Sun Apr 8 00:17:23 2012.

edf40wrjww2msgDetailOT:detailStr
fiogf49gjkf0d
Apple has always had SERIOUS problems with security updates. They either don't do them at all, or they wait. Those running Leopard or earlier have been as abandoned as many Android users. Those running Snow Leopard and Lion are at least getting some security updates though long after the damage is done.

Curiously, a lot of Mac users are now installing Linux, Windows and even our KNOS (which can be configured to look just like OSX) ... and just so folks are aware, the latest trojans don't even bother to put up the "password" warning any longer. They've even bypassed that. Several in the last couple of weeks have ONLY been "caught" (sorta) because an app called "little snitch" fired off after the trojan landed and started sending out banking information. The AV's haven't been doing too well either. :(

That's why F-Secure had to give manual instructions to Mac users to fish through their terminal by hand as though they were configuring a Linux machine. I've had to fix several of them lately. :(

Post a New Response

(928654)

view threaded

Re: More than half a million Macs hit with Flashback Trojan

Posted by SelkirkTMO on Sun Apr 8 00:31:58 2012, in response to Re: More than half a million Macs hit with Flashback Trojan, posted by SelkirkTMO on Sun Apr 8 00:30:30 2012.

edf40wrjww2msgDetailOT:detailStr
fiogf49gjkf0d
And oh yeah ... that "java update" that Apple just put out? It's three versions behind. It's getting exploited too. :(

Post a New Response

(928709)

view threaded

Re: More than half a million Macs hit with Flashback Trojan

Posted by SLRT on Sun Apr 8 10:46:44 2012, in response to More than half a million Macs hit with Flashback Trojan, posted by Olog-hai on Sun Apr 8 00:17:23 2012.

edf40wrjww2msgDetailOT:detailStr
fiogf49gjkf0d
But ... but ... all those Mac owners who tell me how these things aren't a problem with Macs.

Post a New Response

(935418)

view threaded

"Sneakier" version out (More than half a million Macs hit with Flashback Trojan)

Posted by Olog-hai on Tue Apr 24 20:07:58 2012, in response to More than half a million Macs hit with Flashback Trojan, posted by Olog-hai on Sun Apr 8 00:17:23 2012.

edf40wrjww2msgDetailOT:detailStr
fiogf49gjkf0d
ComputerWorld

New, sneakier Flashback malware infects Macs

Ditches all attempts at duping users with social engineered tactics, exploits Java bug through drive-by attacks

By Gregg Keizer
April 24, 2012 02:00 PM ET
A new, sneakier variant of the Flashback malware was uncovered yesterday by the French security firm Intego.

Flashback.S, which Intego described Monday, uses the same Java vulnerability as an earlier version that has infected an estimated 820,000 Macs since its appearance and still plagues over 600,000 machines.

But unlike Flashback.K, the variant that first surfaced last month and has caused consternation among Mac users, Flashback.S never asks the victim to enter an administrative password for installation, but instead relies only on the silent exploit of the Java bug to sneak onto the system.

"The differences are very subtle," Peter James, a spokesman for Intego, said in an interview Tuesday. "There's no password request [by Flashback.S]."

Flashback.K used different infection tactics: Even though it exploited the same Java vulnerability — identified as CVE-2012-0507 — it also displayed the standard OS X password-request dialog. If users entered their password, the malware installed itself in a different location, where it was even harder to detect.

The hackers responsible for Flashback appear to be making money through click fraud, where large numbers of people are redirected to online ads not normally served by the site the user is viewing. The criminals receive kickbacks from shady intermediaries for each ad clicked.

The Java flaw used by both Flashback.S and the earlier Flashback.K was patched by Oracle in mid-February, but Apple, which maintains its own edition of Java for OS X and so is responsible for patching Java bugs, did not issue its fix until April 3, seven weeks later.

Users are infected by Flashback.S when they browse to compromised or malicious sites; the tactic is called a "drive-by" to reflect the lack of required user action beyond steering to a URL.

Some security experts have traced the Flashback infections to tens of thousands of hacked sites and blogs running WordPress.

Because Flashback.S uses different names for the files it drops on a Mac, and installs those files in a different location than Flashback.K, it's possible that the malware seek-and-destroy tool Apple released April 12 won't eradicate the variant.

James said that Intego was not able to confirm whether Apple's tool removes Flashback.S.

It wouldn't be a surprise if Apple's tool did not eliminate Flashback.S: Last year, cyber criminals and Apple went several rounds over MacDefender, a family of fake antivirus programs that wriggled onto a large number of Macs. Several times, the hackers responded to Apple moves by modifying their tactics or code to sidestep just-deployed defenses.

Flashback is easily the most widespread and pernicious malware Mac owners have yet faced.

After a counting controversy, security companies last week agreed that the tally of infected Macs — thought to have dropped to as low as 30,000 — was in fact wrong, and that approximately 650,000 machines still harbored the malware.

Today, U.K.-based Sophos, using data mined from people who run its free Mac antivirus program, claimed that 2.7% of all Macs were infected with malware of some kind. Of those machines, 75% were infested with Flashback.

James tipped his figurative hat to the hackers for their persistence. "There aren't a dozen different groups behind [Flashback]," he said. "They're still hammering on the same vulnerabilities."

Clearly, the attackers are successful enough to keep at it, and keep improving their malware. James thought he knew why.

"Java is more widespread on Macs than most [Mac users] want to admit," he said, countering comments by some Mac owners who have expressed disbelief that the Flashback infection tally was as large as security companies claimed.

"Java is very easy to install, even on Lion," added James, referring to OS X 10.7, which does not include Java, but will ask the user to download it the first time he or she tries to run a Java applet. "Given the number of Macs, there are a lot of OS X people running Java."

Mac owners running either OS X 10.7 or 10.6 — the latter is better known as Snow Leopard — can protect themselves from Flashback.S attacks by updating Java using their machines' Software Update tool.

Because Apple has stopped shipping security updates for older editions — OS X 10.5, or Leopard, and all its predecessors — those users must either remove Java manually or disable it in their browsers.

About 18% of Mac owners ran Leopard or earlier on their systems last month, according to the most recent statistics from Internet metrics company Net Applications.


Post a New Response

(935438)

view threaded

Re: ''Sneakier'' version out (More than half a million Macs hit with Flashback Trojan)

Posted by SelkirkTMO on Tue Apr 24 21:35:18 2012, in response to "Sneakier" version out (More than half a million Macs hit with Flashback Trojan), posted by Olog-hai on Tue Apr 24 20:07:58 2012.

edf40wrjww2msgDetailOT:detailStr
fiogf49gjkf0d
The number of abandoned Mac owners is about 28% ... been following this story. If your Mac is three years old or older, you're SOL because those old machines can't be upgraded to the newer OS versions because of their shitty hardware.

We've got that problem here including a $13,000 uber-Mac. Solution? They're all running KNOS now. KNOS works just fine on Intel Macs. And unlike Apple, we support our OS. :)

Post a New Response


[ Return to the Message Index ]