Flashback Mac botnet shrinks, says Symantec
Number of infected Macs falls by 60%, probably because users are scrubbing malware from systems
Computerworld - The number of Macs infected with the Flashback malware has plummeted in the last few days, antivirus vendor Symantec said today.
As of Wednesday, Symantec estimated that approximately 270,000 Macs were infected with Flashback, down from a peak of more than 600,000 systems on April 6.
Liam O Murchu, the manager of operations with Symantec's security response team, attributed the decline to the "sinkholing" operations conducted by it and other security firms, and to the widespread news of the malware's reach.
"I think what's probably contributing to the decrease in numbers is the awareness of the malware," said O Murchu, referring to the scores of news stories and blog posts that have run since April 4, when a Russian security company announced Flashback had infected more than half a million Macs.
Even so, O Murchu said Symantec had no definitive proof of why the botnet was shrinking, only suspicions.
Symantec tracked the decline of the Flashback botnet -- from 600,000 Macs last week to 380,000 as of Tuesday to 270,000 yesterday -- by using the same intelligence-gathering tactic as the one deployed by two Russian security companies who came up with separate estimates of the Flashback infection.
Flashback includes a domain-generation algorithm that tells the malware where to look for commands each day, a common technique by bot makers. Symantec cracked the algorithm to determine those domains -- they're essentially a jumble of letters -- and registered a week's worth of them. It then set up its own servers on the domains and waited for infected Macs to reach them for orders.
The process, called sinkholing, was also used by Dr. Web and Kaspersky Lab, the two Russian antivirus firms that last week put a number on the size of the Flashback botnet.
Sinkholing also prevents any newly-infected Macs from communicating with the hackers' command-and-control servers, stymying the installation of additional attack code on the machines.
"It prevents new infections," asserted O Murchu.
The criminals responsible for Flashback have also stopped serving malicious content from a number of domains they registered late last month and in early April, Symantec reported.
Kaspersky's sinkhole also reported a drop in the number of Flashback-infected systems connecting to its servers. Earlier this week, Kaspersky said the botnet had gone into free fall, dropping from a high of 650,000 on Friday, April 6 to 237,000 on Sunday.
Other botnets have been suppressed using the sinkholing tactic, most recently last month when four security companies and organizations crippled the resurgent Kelihos botnet.
O Murchu was open to a coordinated effort to do the same with the Flashback botnet, even though that wasn't Symantec's original purpose for grabbing the communication domains.
"That's definitely a possibility, if it was done in a coordinated way," O Murchu said.
Flashback can be removed with one of several tools now available on the Internet, including scrubbing utilities created by Kaspersky and F-Secure. Apple this week also promised it would release its own detect-delete tool, but has not disclosed a delivery date.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
- Apple hasn't exhausted its supply of Yosemite betas
- 13 pieces of advice for Yosemite beta testers
- The other Apple economy: $2B in devices on eBay
- Apple sends users scrambling for OS X Yosemite
- Long replacement cycle drags down iPad sales
- Apple unwraps OS X Yosemite public beta Thursday
- Apple grows Mac sales by 18% on the back of the MacBook Air
- Want an Apple watch? Just 3D print one
- What to listen for during Apple's earnings call today
- Mac sales will again outstrip industry average
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts