Apple says it is working to shut down Flashback infections

Share this article:

For the first time, Apple has acknowledged the outbreak of Flashback malware that has infected some 650,000 Mac computers worldwide.

The Cupertino, Calf.-based computing giant said in a support document, released late Tuesday, that it is creating software to detect and eradicate the sophisticated trojan, which is capable of stealing data, hijacking search results and installing additional malware. In addition, Apple is working with internet service providers to disable the botnet's command-and-control network, which Flashback uses to communicate with its compromised hosts.

Up until this point, Apple had remained mum on the subject, except for the release last week of two Java security updates -- for Mac OS X 10.7 (Lion) and 10.6 (Snow Leopard). They patched the vulnerability being used to spread Flashback.

For users still running 10.5 and earlier versions, Apple suggested they turn off Java functionality through their browser preferences.

Flashback was able to spread because Apple took weeks to patch its iteration of Java, despite Oracle issuing security updates for the software in February.

The number of computers botted with Flasback appeared to peak over the weekend, but experts said the botnet is still functioning normally.

Share this article:

Sign up to our newsletters

More in News

Brazilian president signs internet 'Bill of Rights' into law

Brazilian president signs internet 'Bill of Rights' into ...

President Dilma Rousseff signed the legislation on Wednesday at the NetMundial conference in Sao Paulo.

Android trojan sends premium SMS messages, targets U.S. users for first time

Android trojan sends premium SMS messages, targets U.S. ...

An SMS trojan for Android, known as FakeInst, has been observed sending premium SMS messages to users all over the world, including, for the first time, the United States.

Report: DDoS up in Q4 2013, vulnerability scanners leveraged to exploit sites

Report: DDoS up in Q4 2013, vulnerability scanners ...

Researchers observed 346 DDoS attacks in the final quarter of 2013 and attackers used Vega and Skipfish vulnerability scanners to exploit web flaws at financial companies.