Posts tagged Flashback
A recent version of malicious software called Flashback can install itself on Mac computers without user interaction. Previous “trojan” malware for Macs required an admin password to be installed; they could not be installed secretly and were less likely to spread.
This is the first real “virus outbreak” for Mac computers since OS X was introduced in 2000. It’s a Big Deal.
What you need to know about Mac Flashback malware
How to tell if a Mac is infected
About Flashback malware
A recent version of malicious software called Flashback exploits a security flaw in Java in order to install itself on Macs.
Apple released a Java update on April 3, 2012 that fixes the Java security flaw for systems running OS X v10.7 and Mac OS X v10.6. By default, your Mac automatically checks for software updates every week, but you can change that setting in Software Update preferences. You can also run Software Update at any time to manually check for the latest updates.
Apple is developing software that will detect and remove the Flashback malware.
In addition to the Java vulnerability, the Flashback malware relies on computer servers hosted by the malware authors to perform many of its critical functions. Apple is working with ISPs worldwide to disable this command and control network.
For Macs running Mac OS X v10.5 or earlier, you can better protect yourself from this malware by disabling Java in your web browser(s) preferences.
How should you respond to this Mac malware?
- check to see if your Mac is already infected (see above)
- run Software Update to get system and security updates
- run Software Update at least weekly to ensure you’re up-to-date
- never enter your password without understanding what you’re approving