Doctor Web exposes 550 000 strong Mac Botnet.
Doctor Web—the Russian anti-virus vendor—conducted a research to determine the scale of spreading of Trojan BackDoor.Flashback that infects computers running Mac OS X. Now BackDoor.Flashback botnet encompasses more than 550 000 infected machines, most of which are located in the United States and Canada. This once again refutes claims by some experts that there are no cyber-threats to Mac OS X.
When it comes to viruses and privacy, not a single OS is immune.
Update:-
It seems like Apple has already plugged CVE-2012-0507 security flaw by introducing new version of Java for OS X 10.6 (Snow Leopard) and 10.7 (Lion).
+ Reply to Thread
Results 1 to 6 of 6
-
Last edited by Bonie81; 24th Apr 2012 at 02:19.
-
I beat you.
Reported here: https://forum.videohelp.com/threads/345262-BackDoor-Flashback-39-trojan-infects-Apple-computers
Apr 11, 2012 -
kinda old news. down to maybe 120,000 infected now. but there are different variants being released so the number may go back up. also one estimate put 20% of all macs are "carriers" for windows malware. it doesn't run on the mac it just gets re-distributed.
--
"a lot of people are better dead" - prisoner KSC2-303 -
If it doesn't run on the mac how does it get distributed?
I think,therefore i am a hamster. -
Here's a good read:
http://nakedsecurity.sophos.com/2012/04/24/mac-malware-study/
In related news you can check to see if your DNS has been changed by the trojan:
http://www.dcwg.org/Last edited by MOVIEGEEK; 25th Apr 2012 at 02:59.
-
@TreeTops
I beat you. Reported here: https://forum.videohelp.com/threads/3...pple-computers
Apr 11, 2012
@aedipuss
also one estimate put 20% of all macs are "carriers" for windows malware.
of you are on mac OS X, and take away execute permission. Chances, are others will get infected for sure - a perfect carrier.
@johns0
If it doesn't run on the mac how does it get distributed?
I guess the link I provided was Java-Flash-Zombie. So when you play certain video required flash codecs executes Java BackDoor codes, and infection only took place MAC OS X with Java installed. Normally such files do not have permission to execute. I just came know while packet sniffing (analysis) and observed unsolicited data transfer to suspicious hosts.
MAC OS X : Packet Peeper can serve purpose to sniff packet.
Windows : Network Monitor 3.4 and TCPView (sysinternal) can be used for sniffing.
@MOVIEGEEK
Here's a good read:
http://nakedsecurity.sophos.com/2012...malware-study/
In related news you can check to see if your DNS has been changed by the trojan:
http://www.dcwg.org/
For those who run Home Server : GRC : DNS Nameserver Spoofability Test
Scroll down till bottom of the web page to initiate DNS Spoofability Test.
Thanks to all of you.
Last edited by Bonie81; 25th Apr 2012 at 18:16.
Similar Threads
-
I'm currently working on a web-app from my mac using XAMPP etc...
By Tom2me in forum ffmpegX general discussionReplies: 5Last Post: 1st Aug 2010, 09:55 -
The New Doctor Who
By Cole in forum Off topicReplies: 75Last Post: 10th Jan 2010, 20:47 -
How strong laptop do I need to capture HDV
By Cazz in forum Capturing and VCRReplies: 5Last Post: 7th Jan 2010, 09:26 -
malware infected mac botnet up and running
By minidv2dvd in forum MacReplies: 1Last Post: 16th Apr 2009, 23:55 -
FFMPEG x to PAL-DVD, strong deblocking ?
By halsboss in forum Video ConversionReplies: 7Last Post: 3rd Apr 2008, 04:52