Watch out Macs. Flashback is back.
Variations of the trojan have reportedly infected 600,000 Mac computers around the globe, with about 57 percent in the U.S. and another 20 percent in Canada.
Dr. Web, who discovered the spreading Flashback, said that these trojans install themselves on your computer after visiting compromised/infected webpages on the Internet. Then the Flashback trojans search your infected Macs for any of the following antivirus applications.
- /Library/Little Snitch
- /Applications/VirusBarrier X6.app
- /Applications/Packet Peeper.app
If any are detected, the trojan deletes itself. If none of the searched for antivirus apps are found, it continues to generate a list of botnet control servers and begins checking in with them. If you've been infected with this trojan, chances are a virus is the next step.
A patch for the Java vulnerability has been issued by Apple, so if you've got a Mac, hit up your Software Update to download the latest Java update for OS X. But what if you already have the Flashback trojan on your computer?
F-Secure has some great instructions for using Terminal to find out if you do or do not have the trojan installed. If you don't, great. Just install the latest Java update. If you do, you'll also get instructions for manually deleting the files.
If you get back "these do not exist" after running these four strings, you should be fine.
defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
defaults read /Applications/Safari.app/Contents/Info LSEnvironment
defaults read /Applications/Firefox.app/Contents/Info LSEnvironment
defaults read /Applications/Google\ Chrome.app/Contents/Info LSEnvironment
Want to start making money as a white hat hacker? Jump-start your white-hat hacking career with our 2020 Premium Ethical Hacking Certification Training Bundle from the new Null Byte Shop and get over 60 hours of training from ethical hacking professionals.