Flashback gang could be making $10K a day off infected Macs
Symantec spells out the malware's money-making mechanism: click fraud
Computerworld - The Flashback malware that's infected hundreds of thousands of Macs may be generating more than $10,000 a day for the hackers who made the Trojan horse, Symantec said Monday.
The malware steals clicks from ads that Google's search engine displays alongside search results.
In a blog entry posted today, Symantec published an analysis of Flashback's money-making capabilities, and concluded -- as others had earlier -- that the gang was turning a profit through click fraud.
Flashback.K surfaced in March and by early April had infected more than 600,000 Macs.
"Click fraud" describes campaigns where large numbers of people are silently redirected to online ads not normally served by the site the user is viewing. The criminals receive kickbacks from the sometimes-legitimate, sometimes-shady intermediaries for each ad clicked.
The clicks are "ghost clicks" in that they are not triggered by a human, but instead by the botnet.
That's exactly what Flashback.K does, said Symantec. After worming its way onto a Mac via an exploit of a since-patched Java vulnerability, Flashback.K loads an ad-clicking component into Apple's Safari, Google's Chrome and Mozilla's Firefox browsers.
"Flashback specifically targets search queries made on Google and, depending on the search query, may redirect users to another page of the attacker's choosing, where they receive revenue from the click," said Symantec. "Google never receives the intended ad click."
In one code snippet shown by Symantec, a hijacked ad based on the user searching for "toys" would generate $0.008 per click, meaning that 1,000 clicks would earn the hackers $8, 10,000 clicks $80, and so on.
The Flashback gang is still earning this fraudulent revenue, even though much of the botnet has been "sinkholed" by Symantec and other antivirus companies, said Vikram Thakur, principal security response manager at Symantec. By registering as many potential command-and-control (C&C) domains used by the malware to receive instructions, security researchers prevent orders from reaching the infected Macs. The commands fall down a metaphoric "sinkhole" instead.
But in an interview today, Thakur confirmed that Flashback-infected Macs, even those that have been sinkholed by security firms, continue to produce revenue for the hackers.
"They're still making money," said Thakur, explaining that the ad-clicking component communicates to different C&C servers whose IP addresses are hard-coded into the malware. Those servers have not been sinkholed. "In fact, they're making a lot of money.
How much wasn't clear. Symantec hasn't been able to uncover the botnet revenue, but instead compared its size and money-making abilities to the 2011 "W32.Xpaj.B" botnet, a collection of 25,000 compromised Windows PCs that returned up to $450 per day to its handlers.
If Flashback's profit-making is as efficient, and with its size hovering around 600,000 Macs, by that example it could generate up to $10,800 per day, or $75,600 per week or $3.9 million over the course of a year. All tax free.
"That's a lot of money," Thakur said.
- Apple users were left at risk by 3-week delay between OS X and iOS patches
- As iPad sales slump, Cook hijacks analysts' fast-uptake explanation
- Apple defies PC downturn again, boosts Mac sales
- Tim Cook to Microsoft: Better late than never for Office on iPad
- Apple kicks off public OS X beta testing
- Apple patches Secure Transport, but not because of Heartbleed
- Apple customers downsize iPhone, iPad storage in March quarter
- Free OS X Mavericks now powers half of all Macs
- Apple has bigger plans than just song ID with Shazam deal
- Mac Pro shortage sets record as worst Mac production debacle
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Malware and Vulnerabilities White Papers | Webcasts