Intego Detects Latest Version of Flashback
According to security experts at Intego, the leading provider of 'Mac anti-virus' as well as computer-security, one fresh Flashback variant known as Flashback.S, a Trojan malware is circulating in the wild as it abuses the same security flaw in Java which its earliest variant did.
Flashback.S has contaminated a total 820,000 Mac computers ever-since it emerged and continues to inflict more than 600,000 systems.
The experts state that the latest Flashback variant doesn't need a password for loading itself as also that it plants malicious files inside /.jupdate and /Library/LaunchAgents/com.java.update.plist that belong to the computer owner's home archive. Subsequently, it erases every file/folder within /Library/Caches/Java/cache so the applet can be cleansed off the contaminated computer, while bypassing identification alternatively malware-mending.
Indeed, Intego has detected many copies of the Flashback.S that's getting disseminated.
However, different from Flashback.K, the version, which made its debut in March 2012, and induced alarm amidst Mac-owners, Flashback.S doesn't make its victim provide any password for getting planted rather it uses the Java flaw.
Security experts Hughes and Adrian Kingsley of Forbes explained that the Flashback.S could simply contaminate a Mac-user if he was made to view one website pushing the malware that understandably was a compromised WordPress blog. But the user must be browsing inside the Safari Web-browser, they added. Esecurityplanet.com published this dated April 24, 2012.
During the middle of February 2012, Oracle patched the Java vulnerability, which both Flashback.K and Flashback.S exploited; however, Apple that provides one Java version of its own for Mac OS; consequently requires patching the software's vulnerabilities, hasn't yet released a fix for the said vulnerability.
And as Flashback.S assigns various filenames to its copies it plants onto any Mac, followed with uploading the same onto a folder different from that of Flashback.K, it is probable that an Apple tool for seeking-and-destroying malware won't eliminate Flashback.S.
Intego's researchers state that Flashback can undoubtedly be described as the most widely proliferating as also destructive malware confronting Mac-users. Whilst an appropriate tool for removing Flashback variants is awaited, security companies such as Intego and Apple are sure they'll detect and eliminate all the Flashback variants.
Related article: Indictment On Two Ohio Men For Selling Porn DVDs
» SPAMfighter News - 01-05-2012