Where it all began
Ars Technica had been keeping tabs on the Flashback Trojan since it appeared in 2011. The Trojan posed as a Flash player installer, easily tricking some Mac users into installing the malicious program. The threat was marked as “low” since not many Mac users use Flash.
Later, a more potent variation of the Flashback Trojan, Flashback C, surfaced, still posing as a Flash installer. The new variation disables Apple’s automatic updating mechanism for its system-wide malware application, rendering infected Macs doomed to never receive security updates needed for the removal of the malware.
Mode of transmission
The exploit then saves an executable file on the hard drive of the infected Mac, which downloads a malicious payload from a remote server and then launches it.
According to Dr. Web, attackers started exploiting the vulnerabilities in February of this year, but it wasn’t until April 3 that Apple closed the hole.
Am I infected?
If you’re using a Mac and are fond of visiting various websites, there’s a high probability that your machine is already infected.
Dr. Web strongly recommends Mac users to download and install the security update released by Apple, found here.
F-Secure, an anti-virus and computer security and computer software company, offers instructions on how to determine if your Mac had been compromised and how you can remove the Trojan. Click here to learn more about it.
Latest posts by Mellisa Tolentino (see all)
- Next-gen fingerprint tech for mobile and IoT devices announced - December 1, 2015
- Watch LIVE: theCUBE covers Hewlett Packard Enterprise’s new cloud and analytics strategies at Discover London event | #HPEDiscover - December 1, 2015
- What you missed in the Smart World: Huawei Watch QSG review, smartwatch trends and more - November 30, 2015