According to Dr. Web, the 57 percent of the infected Macs are located in the US and 20 percent are in Canada. Like older versions of the malware, the latest Flashback variant searches an infected Mac for a number of antivirus applications before generating a list of botnet control servers and beginning the process of checking in with them.The authors of the Flashback trojan have continued to tweak the software since it first surfaced last September, adjusting its tactics several times to include both social engineering tricks and exploits of vulnerabilities.
The most recently-seen version of Flashback surfaced earlier this week, exploiting a Java vulnerability that was unpatched on OS X. While Oracle had released an update closing the hole on Windows back in February, Apple had yet to issue a fix for Macs, as the company has historically maintained its own Java updates that are deployed some time after Oracle issues its own corresponding updates. But just a day after that report, Apple did update Java to address the vulnerability being exploited by Flashback.
Antivirus firm F-Secure has instructions on how users can determine whether their machines are infected by the Flashback trojan. The instructions do involve running commands in Terminal, and users should thus take care to follow the instructions exactly.
Recent Mac and iOS Blog Stories
• Apple Still Advertising iPad 2 on Roof of West 14th Street Retail Store
• Push Email Coming to Sparrow for iPhone, Promises Developer
• Apple Releases Update to Java for OS X to Version 1.6.0_31
• File Taxes On the Go with TurboTax for iPad and iPhone
• Apple's iBookstore Coming to Brazil in April?
No comments:
Post a Comment
Thank's!