View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
April 10, 2012updated 22 Aug 2016 12:43pm

Kaspersky blames Apple for massive ‘Flashfake’ malware breakout

Kaspersky is blaming Apple's inaction on the Flashfake trojan as the main cause for the worldwide MacOS infection.

By Allan Swann

Apple’s long standing (and false) reputation for being ‘malware free’ has taken a huge blow as a new Trojan, Flashfake, has infected Apple computers worldwide.

Kaspersky Lab’s Chief Security Expert, Alexander Gostev, is laying the blame squarely at the corporation’s feet.

He says that Apple knew about the threat for months, but did little to protect its MacOS users from the Java vulnerability – while rival systems had been patched by Oracle months earlier.

Virus

In what will make it one of the largest malware infections in mac computing history, Kaspersky says that approximately 98% of the 670,000 computers infected with the Flashfake are running MacOSX, compared with just 2% on other operating systems.

Whereas on other computing systems Oracle (Java’s owner) issued a security patch nearly 3 months ago, Apple doesn’t allow Oracle to patch Java for Mac on its own. They keep it hands on and do it themselves, historically several months after the fact. In this case, Apple only sent out its own patch on April 2nd. This meant that the window of exposure for Mac users was much, much longer than other PC users.

"The three month delay in sending a security update was a bad decision on Apple’s part," said Gostev.

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

"Apple knew about this Java vulnerability for three months, and yet neglected to push through an update in all that time."

"The problem is exacerbated because – up to now – Apple has enjoyed a mythical reputation for being ‘malware free’. Too many users are unaware that their computers have been infected, or that there is a real threat to Mac security," said Gostev.

Flashfake is a family of OS X malware that first appeared in September 2011. Previous variants of the malware relied on cyber criminals tricking users into downloading the malicious program and installing it in their systems. This latest version of Flashfake exploits a vulnerability in Java, and does not require any user-interaction. It occurs when victims unwittingly visit infected websites, allowing the Trojan to be downloaded directly onto their computers through the Java vulnerabilities.

Users infected by the virus could have their computers watched and controlled remotely by hackers, which then makes any personal info and banking information vulnerable.

Virus writers are increasingly targeting Mac users, a threat that has been limited historically, by Apple’s small user base and its creative-industry focus. For business savvy cyber-criminals – the return on investment simply wasn’t there. However, the increasing popularity of Apple Macs, especially in consumer markets has changed that.

It doesn’t help that users and Apple alike have long painted the MacOS platform as being free of viruses and malware – a myth so strongly held by Apple fanboys that many users don’t even install anti-virus software on their machines. Flashfake may change all that, and open a lucrative new market for the IT security companies.

This is the largest Mac-based infection to date, with the largest number of victims targeting developed countries. The United States had the most infected computers (300,917) followed by Canada (94,625), the United Kingdom (47,109) and Australia (41,600). Other infected countries included France (7,891), Italy (6,585), Mexico (5,747), Spain (4,304), Germany (4,021) and Japan (3,864).

Apple, while previously staying mum on the subject, finally came out and admitted there was a problem, stating that, while the vulnerability has been patched, it is still "developing software that will detect and remove the Flashback malware" for computers already infected. No timeline was offered for this fix.

Kaspersky and a number of other outlets have already issued their own Flashfake remover tools.

Other than the update already delivered Apple has been recommending that users disable Java in their browser preferences. Apple has also said that it is working with ISPs worldwide to disable the Botnet’s command and control network.

 

 

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU