Thursday, 29 September 2011

OSX/flashback.A malware discovered for Mac

OSX/flashback.A malware discovered for Mac | Ubergizmo window.fbAsyncInit = function() { FB.init({ appId : '139683546053659', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); }; (function() { var e = document.createElement('script'); e.src = document.location.protocol + '//connect.facebook.net/en_US/all.js'; e.async = true; document.getElementById('fb-root').appendChild(e); }()); Network:Ubergizmo English, French, SpanishUberphones Subscribe to RSS Ubergizmo ReviewsMobileGamingAndroidAppleComputersGadgetsConceptsPhoto/VideoEvents |  Jobs Home > Apple > OSX/flashback.A malware discovered for Mac OSX/flashback.A malware discovered for Mac Tyler Lee 09/27/2011 06:21 PDT

While in general, Mac computers are less prone to viruses and malware, there are still a couple that manage to slip in under the radar from time to time. A while back we reported on a malware that disguised itself as part of Adobe Flash’s installation, which the user would unwittingly install if they did not know any better. It looks like yet another bogus Flash installer is back and this one appears to be more malicious, going beyond launching popup windows.

The malware is called OSX/flashback.A and its download link is said to be found on malicious websites, which means that should you be surfing malicious or suspicious websites, be on the lookout for the installation link should you accidentally click on it.

Upon launching the installer, the malware will then proceed to disable network security software. At the moment it looks like the malware is targeting Little Snitch but has no effect on Intego VirusBarrier X6. After installation, the malware will install a dynamic loader library and auto-launch code, which allows for it to inject its code into applications launched by the user. The code will then attempt to connect to a remote server and sends the user’s information to it, which we’re guessing will be used to identify infected computers for future malicious activities.

While this might seem obvious, installation of software or plugins are best installed or downloaded from their respective websites, as opposed to third party websites which may contain malware like the OSX/flashback.A. Keeping your computer up to date with an anti-virus software will also go a long way in preventing incidents like this in the future.

Read: cultofmac  | Add a Comment 

Follow Ubergizmo's founders on    Eliane Fiolet  Hubert Nguyen  Topics: Apple, Computers | Articles by keywords: anti virus, mac, malware, os x, osx/flashback.a, security, trojan Reviews Olympus E-P3 ReviewEpic 4G Touch ReviewGalaxy S2 ReviewDroid Bionic ReviewHP TouchPad Review - With Our Deepest CondolencesHTC Wildfire S ReviewBlackberry Bold 9900 Review
ArchivesIf you want to dig deep into Ubergizmo's past, and check what was going on previously, check our archive page. It's great for random browsing, but a search may be faster to find something specific.
TrendingiPhone 5 redesign reworked, Samsung Galaxy S3 to launch in February 2012?Sony Video Unlimited Takes Content Browsing to the Next LevelNexus One gets Android Gingerbread 2.3.6 updateSamsung Galaxy Skin 2012 Launch Rumors Samsung Galaxy S2 and Galaxy S2 HD gets LTE goodnessGalaxy S2 Review Related Articles
User Comments Privacy PolicyTerms of UseContactAbout|  Q: 10  ID: 89999  

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

No comments:

Post a Comment