Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in your inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Intego Detects Latest Version of Flashback

According to security experts at Intego, the leading provider of 'Mac anti-virus' as well as computer-security, one fresh Flashback variant known as Flashback.S, a Trojan malware is circulating in the wild as it abuses the same security flaw in Java which its earliest variant did.

Flashback.S has contaminated a total 820,000 Mac computers ever-since it emerged and continues to inflict more than 600,000 systems.

The experts state that the latest Flashback variant doesn't need a password for loading itself as also that it plants malicious files inside /.jupdate and /Library/LaunchAgents/com.java.update.plist that belong to the computer owner's home archive. Subsequently, it erases every file/folder within /Library/Caches/Java/cache so the applet can be cleansed off the contaminated computer, while bypassing identification alternatively malware-mending.

Indeed, Intego has detected many copies of the Flashback.S that's getting disseminated.

However, different from Flashback.K, the version, which made its debut in March 2012, and induced alarm amidst Mac-owners, Flashback.S doesn't make its victim provide any password for getting planted rather it uses the Java flaw.

Security experts Hughes and Adrian Kingsley of Forbes explained that the Flashback.S could simply contaminate a Mac-user if he was made to view one website pushing the malware that understandably was a compromised WordPress blog. But the user must be browsing inside the Safari Web-browser, they added. Esecurityplanet.com published this dated April 24, 2012.

During the middle of February 2012, Oracle patched the Java vulnerability, which both Flashback.K and Flashback.S exploited; however, Apple that provides one Java version of its own for Mac OS; consequently requires patching the software's vulnerabilities, hasn't yet released a fix for the said vulnerability.

And as Flashback.S assigns various filenames to its copies it plants onto any Mac, followed with uploading the same onto a folder different from that of Flashback.K, it is probable that an Apple tool for seeking-and-destroying malware won't eliminate Flashback.S.

Intego's researchers state that Flashback can undoubtedly be described as the most widely proliferating as also destructive malware confronting Mac-users. Whilst an appropriate tool for removing Flashback variants is awaited, security companies such as Intego and Apple are sure they'll detect and eliminate all the Flashback variants.

Related article: Indictment On Two Ohio Men For Selling Porn DVDs

ยป SPAMfighter News - 01-05-2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next