Flashback malware infects 2% of all Macs
Second source confirms massive Mac infestation, claims more than 600K machines compromised
Computerworld - Nearly 2% of the Macs whose owners have checked their computers have been infected with the Flashback malware, according to a Russian antivirus company.
Of the 55,000 users who have used Dr. Web's free tool to determine whether their Macs had been infected by Flashback, just over 1,000 have been told their computers harbor the malware and are part of a growing botnet.
That means approximately 1.8% of the checked Macs are infected.
To put the Flashback infection rate into context, Conficker, a worm that plagued massive numbers of PCs from the fall of 2008 through the spring of 2009, infected as many as 4%-5% of all Windows systems at its most active.
Dr. Web's free tool matches the UUID (universally unique identifiers), a fingerprint of each individual Mac, to the list of infected systems the company compiled after "sinkholing," or commandeering, a command-and-control (C&C) server that took calls from compromised computers.
The tool's data is not a scientific survey, of course, since users must steer to the Web-based tool manually, likely after reading about the Flashback malware and suspecting that their Mac has been infected.
Last week, Dr. Web estimated that more than half a million Macs had been hit with Flashback through social engineering trickery and drive-by attacks that silently exploited a critical vulnerability in Oracle's Java.
Also last week, Apple patched Java for Mac OS X users, but the fix came seven weeks after Oracle quashed the bug for Windows and Linux users. Apple maintains Java for its users, a practice that has prompted some experts to bash the company's lethargic patching, which has lagged behind Oracle by months in some cases.
Dr. Web later revised its estimate of hijacked Macs to more than 600,000.
Kaspersky analyzed Flashback's communications technique, and on Thursday registered a C&C domain before the hackers could get to it. The infected machines then contacted that domain.
Kaspersky counted approximately 600,000 computers that connected to the server.
While the antivirus company would not go so far as to claim that all of those systems were running Mac OS X, it said other tools hinted that 98% of them were, in fact, Macs.
Some security experts pointed to Apple's slow patching as a factor in Flashback's success. "Apple was really behind the timeline here," said Mike Geide, senior security researcher at Zscaler ThreatLabZ, in an interview last week.
Hackers had a seven-week window to examine Oracle's patch before Apple released its fix.
"What's going to be really, really interesting is when the next major Java vulnerability appears," said Geide. "What will Apple's response be the next time around?"
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
- Mac Pro shortage sets record as worst Mac production debacle
- Apple slates WWDC for June 2-6, sets up ticket lottery
- Apple patches Safari's Pwn2Own vulnerability, two-dozen other critical bugs
- Microsoft's free OneNote vaults to top of Mac App Store chart
- Apple discounts iPhone 5C 8%-9% in five markets via storage cuts
- Apple hands stock worth $12.1M to top execs in retention deal
- Hands on: Apple's Mac Pro is the fastest Mac ever
- Apple CFO to retire in September after he cashes in $53M stock award
- Apple's CarPlay to spark mobile apps war in your car
- Apple retires Snow Leopard from support, leaves 1 in 5 Macs vulnerable to attacks
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Malware and Vulnerabilities White Papers | Webcasts