600,000 Macs Hit With Backdoor.Flashback Trojan - HotHardware
600,000 Macs Hit With Backdoor.Flashback Trojan

600,000 Macs Hit With Backdoor.Flashback Trojan

While many have dogmatically adhered to the idea that Macs are impervious to malware, some experts have been warning that it was only a matter of time before the Apple systems were hit with significant bugs.

Findings like the one from Doctor Web late yesterday confirm that indeed, the malware threat looms large for Mac users. According to Doctor Web, a Russian antivirus vendor, 600,000 Macs were part of the BackDoor.Flashback.39 botnet. (Originally, the company reported the number at 550,000, but a Twitter post later upped it to over 600,000.)



The Flashback Trojan isn’t especially new; variants have been around since at least September 2011, but like all good malware, it’s been evolving. Apple finally patched the Java exploit that was affecting machines running Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, and Lion Server v10.7.3.

Security firm F-Secure posted a way to identify and remove the virus, and had this to say:
On execution, the malware will prompt the unsuspecting user for the administrator password. Whether or not the user inputs the administrator password, the malware will attempt to infect the system, though entering the password will affect how the infection is done.
According to Doctor Web, 56.6% of the infested hosts are in the U.S., 19.8% are in Canada, the UK has 12.8%, and Australia has 6.1%. The company recommends downloading and installing this security update from Apple.
0
+ -

if you run a Mac better grab the latest update which includes a java update that plugs the hole.

0
+ -

And don't put in your passwords or log-in into any pop-up request panel that may show up...

Even with the patch they're reporting still more systems being infected... Security can't protect from user error...

-1
+ -

Not a problem with Macs; a problem with Oracle software (i.e. the Java vm).

There are dozens of trojans of this same type that affect Windows, but they're not news because everyone knows the OS is perpetually insecure. The spin here is that it can be made to look like the Mac OS is insecure when it's actually the third party software.

0
+ -

@3vi1 I'm fairly certain the fault lies with Mac's, from my limited understanding of it Apple decided to write their own JVM so it's not a pure Sun/Oracle thing.

0
+ -

ErazmusNZ:

@3vi1 I'm fairly certain the fault lies with Mac's, from my limited understanding of it Apple decided to write their own JVM so it's not a pure Sun/Oracle thing.

No.  Apple uses the standard JVM  - they just ship it with the OS as an integration point.  The flaw exploited was from Oracle code, but Apple didn't immediately ship an update when Oracle fixed it in v1.6.0_31 back in February.

If Apple were to ever stray from the standard JVM, I'm pretty sure Oracle would find some way to try to sue them like they're doing with Google.  :)

0
+ -

I guess the real problem here if that with java on a Mac you have to wait for Apple to release the update. Unfortunately on the PC side of things both *nix and Windows billions of systems are running out of date Java. I usually recommend to folks not to install Java unless you really need it for something, same goes for Flash or Silverlight.

0
+ -

Hopefully the code quality will go up and the exploits will go down now that Oracle's re-basing their code around the open source OpenJDK as the official implementation for Java 7.

Login or Register to Comment
Post a Comment
Username:   Password: