Discussion in 'malware problems & news' started by EncryptedBytes, Apr 5, 2012.
A responsible Mac user.
Don't worry. If it gets too bad, Apple will just shut your computer down by remote control until they fix it! (Just kidding)
My lady has used Macs for something like 5 years and never had any kind of AV protection. I don't even think she updates all that regularly. I kinda hope it's automatic
Being a PC man, I'm a paranoid nut-job compared to her.
It's one of those weird things. Some of the AV's available for Macs are pretty pricy *cough* Intego *cough*. Until Mac viruses become a bit more widespread it just isn't worth shelling out for.
After reading about this new bug I made her install Sophos free Mac AV.
A scan revealed she had 9 threats. Only one was a Mac bug, some fake AV for Macs app. The other 8 threats were Windows threats. We've left them on there for now.
It's a tough call, but if you can get decent free or cheapish protection for your Mac I don't get why you wouldn't use it.
The thing is lets say you have an infected email thats target for windows on your mac,sure it wont hurt you but lets say you sent it off to family,friends running windows and they open the infected email that came from you. It is there resposibility to protect them self,but regardless you will become the evil villian that sent it to them.
Thats what greatwhite pointed out in post # 24 about infecting windoz users by running a AV program to prevent it all around.
BackDoor.Flashback.39 epidemic chronology
April 10, 2012
The news of the outbreak of BackDoor.Flashback.39 that has infected over 650 000 computers running Mac OS X quickly spread throughout the world, causing a strong public response. The Russian anti-virus company Doctor Web that was the first to issue a warning concerning this threat presents the brief BackDoor.Flashback.39 outbreak chronology.
February 2012 Oracle released an update for the Java Virtual Machine closing vulnerabilities exploited by BackDoor.Flashback.39.
March 25, 2012 First Flashback botnet domains registered
March 27, 2012 Doctor Web added the BackDoor.Flashback.39 signature into the virus database used by its Dr.Web for Mac OS X.
April 3, 2012 Doctor Web analysts reverse-engineered the routine employed by BackDoor.Flashback.39 to generate control server domain names, registered several domain names and began gathering statistics by analysing requests received from bots. More than 130000 bot replies were received in the very first hours.
April 4, 2012 According to data collected by Doctor Web virus laboratory, the number of infected hosts in the BackDoor.Flashback.39 botnet reached 550,000. Doctor Web issued a press-release concerning the BackDoor.Flashback.39 epidemic.
April 4, 2012 (April 3 for North America). Apple has released an update for Apple Java closing the vulnerabilities exploited by the Trojan BackDoor.Flashback.39. Due to the difference in time zones, many Mac OS X users got the update after a significant delay.
April 4, 2012 The number of hosts in the botnet exceeded 600 thousand infected Macs.
April 6, 2012 Apple released a second update that closed the vulnerabilities exploited by the Trojan BackDoor.Flashback.39.
April 9, 10 A corporation made unsuccessful attempts to block domains used by Doctor Web to study the BackDoor.Flashback.39 botnet.
April 10 The total number of computers infected by the Trojan has exceeded 650,000.
The current number of machines infected by BackDoor.Flashback.39 is 655 700. Mac users can use the free service from Doctor Web at www.drweb.com/flashback/ to check if their computers are infected.
View the article
Kaspersky Launches Free Flashback Removal Tool and Website to Check for Infections by Lucian Constantin.
But MAC's don't get infected. Ask at the Apple forum.
Wow the number is climbing.I wouldn't be a bit suprised if it climbs much higher then it is.
Hopefully they will change there tune or just stay in denial.
Free stand-alone removal tool from F-Secure:
Free stand-alone removal tool from Kaspersky (already mentioned by JRViejo):
BBC tech site:
Apple develops tool to 'detect and remove' Flashback Trojan
Number of Macs Infected With Flashback Trojan on the Decline
Are Macs safer than PCs?
OSX.Flashback.K – Suffering a Slashback – Infections Down to 270,000
Some more info here:
Kaspersky Lab suspends Flashback-removal tool by Joel Mathis.
I'm not sure if it's just me, but I can't stop but have the feeling that also automatically disables Java if it has not been used during the previous 35 days and Once disabled, users have to manually re-enable Java in order for Java applets to run again. is not really the solution.
Sure, it's good to be disabled after a while, but what if from day 1 to 34, the user visits a legitimate website with some third-party ads, coming from an hijacked ad network, which will then point to an exploit ready to exploit a Java security vulnerability?
Right. I didn't bother reading those articles, but do they make any mentions to Apple actually releasing Oracle's patches as soon as they come out? I imagine they don't, otherwise you folks would have mentioned something about it.
It may be late to the game... The thing is, they're not playing the game, at all.
Apple's Flashback fixes: Three belts and a pair of suspenders by Philip Elmer-DeWitt.
Flashback Malware Removal Tool
Flashback Malware Puts Apple in Security Spotlight: Experts Weigh In by Howard Baldwin.
Flashback waning, but still infecting about 140,000 Macs by Chris Foresman.
Boris Sharov (DrWeb):
Doctor Web doesn't register significant decrease in BackDoor.Flashback.39 bot number
Flashback infections not waning after all; 650,000 Macs still hijacked
This image charts the number of Flashback bots from April 3 to April 19.
New Flashback variant making the rounds by Steven Musil.
Separate names with a comma.