SECURITY

More Malware Hits Macs By The Back Door

10/4/2012 3:10:01 PM

Flashback infection lets hackers into ‘hundreds of thousands’ of systems

Apple users’ relative indifference to the threat of viruses has again been called into question by a malware outbreak. But a lack of anecdotal reports from ordinary users casts doubt on estimates of its scale.

Earlier this month, Russian security firm Dr. Web said its research show that up to 600,000 Macs around the world had been recruited to a botnet - an illicit network of computers unwittingly controlled by a hacker to launch attacks on other systems - by a program known as Flashback. Although O S X users were affected by the malware, the vulnerability it exploited wasn’t in the operating system itself but in the Java runtime environment, an optional extra that can be installed to support applications and web applets that require it. Apple doesn’t supply Java as standard with new Macs.

Description: Malware hits Macs
Malware hits Macs

Despite widespread publicity, Apple offered no immediate response. Sometime later, a patch appeared in Software Update that fixed the hole in Java when installed by the user. After a further week, another update for OS X Lion and Snow Leopard added the ability to remove Flashback from already infected Macs. A standalone Flashback malware removal tool was then released to remove Flashback from systems without Java installed, preventing its propagation.

Both of these tools scan a Mac for Flashback and remove it if it’s there, before displaying a dialog box explaining what’s happened. The Lion version also disables the Java web plug-in if it hasn’t been used for 35 days, thus preventing Flashback from running if it’s later downloaded. Java applets can be re-enabled manually by the user.

Security firm Intego, which first discovered Flashback in September 2011, pointed out that Apple’s update didn’t remove all instances of the malware. ‘We are not sure which variants this covers; Intego currently has 18, from Flashback A to Flashback R, and Apple’s tool clearly does not detect and remove all of them,’ it wrote in a blog post. Inevitably, this advice was followed by a link to Intego’s own anti-virus software. Other firms, including F-Secure, Kaspersky and Symantec, also released tools specifically to detect and remove Flashback.

Description: Apple released Software Update patches to remove Flashback and prevent it from infecting a Mac in the future, but was it too little too late to prevent a major outbreak?
Apple released Software Update patches to remove Flashback and prevent it from infecting a Mac in the future, but was it too little too late to prevent a major outbreak?

“The delay in Apple’s response created the worst ever security threat to OS X, some commentators said”

Apple came under fire for taking weeks to respond to the Flashback outbreak. The delay meant most of the computers infected were Macs, a stark contrast to the typical scenario of malware affecting only Windows systems. Some commentators described Flashback as the worst security threat OS X had ever seen. Dr. Web’s estimate of 600,000 systems included 47,000 in the UK, all of which the company said had been added to a botnet that was used to track web browsing data, user IDs and passwords.

Flashback -> despite these huge numbers, which would represent about 1% of all Macs in use, stories of individual users actually confirming that their machines were infected were oddly scarce. Over several days of responses from Twitter followers who between them were responsible for hundreds of Macs, only one example was discovered by Mac User of an infection in the UK.

Description: Flashback relies on computer servers hosted by [its] authors to perform many of its critical functions,’ the company said in a statement.

Flashback relies on computer servers hosted by [its] authors to perform many of its critical functions,’ the company said in a statement.

Apple later moved to limit the damage caused by the botnet by asking hosts to shut down servers accessed by the malware. ‘In addition to the Java vulnerability, Flashback relies on computer servers hosted by [its] authors to perform many of its critical functions,’ the company said in a statement. ‘Apple is working with ISPs worldwide to disable this command and control network.’

Ironically, among the first command centers apparently targeted was one operated by Dr. Web, which was using it as a ‘sinkhole’ to monitor and thwart the botnet. A failure of communication was blamed by some for the slow and uncoordinated response to the outbreak. ‘Apple needed to deal with outside security experts,’ wrote Tim Dickinson at TechFruit, ‘except as is with the case with Apple, they don’t work well with others.’

Flashback first appeared as a Trojan horse: disguised as an updater for Adobe’s Flash Player, it relied on the user agreeing to install what looked like an innocuous app. Subsequent version added the ability to bypass OS X’s built-in malware detection, making it immune to the automatic updating mechanism that killed off the Mac Defender malware a year ago. But the user still had to be fooled into manually entering an administrator password, making it a social attack rather than a virus. Significantly, the most recent variant was a ‘drive-by1, where the download initiates without the user’s knowledge or interaction. It exploited vulnerability in Java which was, until the beginning of April, unpatched by Apple, despite Java maker Oracle having issued a fix for Windows in February. And it didn’t need an administrator password to install itself.

Description: Flashback first appeared as a Trojan horse: disguised as an updater for Adobe’s Flash Player

Flashback first appeared as a Trojan horse: disguised as an updater for Adobe’s Flash Player

“Drive-by downloads install, without user interaction, from websites that have been ‘poisoned’”

Drive-by downloads are typically hosted on websites that have been ‘poisoned’, usually by hosting infected adverts or videos. The malware itself, or payload, is known as a ‘backdoor’ because, once downloaded, it opens ports on the infected machine to allow access from remote computers.

Security experts warn that more variants of Flashback are likely to emerge, but Mac users who have updated to the latest version of Java should have nothing to worry about. Within a few days of Apple’s Java update, security firm Symantec reported the number of infected Macs had dropped to 270,000; at the time of writing, this had fallen to 140,000. ‘Many of the domain names that were in charge of the botnets have been taken over, so the chances of the attackers building their botnets again from those machines is pretty slim,’ Symantec Researcher Liam O Murchu told TechNewsWorld.

Another security researcher, Trend Micro’s Ivan Macalintal, was keen to point out that Mac users needed to be vigilant. ‘You’ll see more of these things in Macs in the future, ‘he told TechNewsWorld’s John P Mello. ‘They’re on the radar of cybercriminals right now.’ But McAfee’s Dave Marcus noted that ‘how successful they are will be spotty’.

Although widely reported, the estimate of 600,000 infections has not been verified.

 

Other  
  •  The Hacked Man (Part 2) - Digital gold: passwords and mail addresses
  •  The Hacked Man (Part 1) - Facebook : Rummaging a digital rubbish bin
  •  Implementing Security in Windows 7 : Set the Junk E-mail Protection Level
  •  Implementing Security in Windows 7 : Delete Your Browsing History
  •  Web Security : Attacking AJAX - Checking for Cross-Domain Access, Reading Private Data via JSON Hijacking
  •  Web Security : Attacking AJAX - Subverting AJAX with Injected XML, Subverting AJAX with Injected JSON
  •  .NET Security : Programming the Event Log Service (part 3) - Using Custom Event Logs, Monitoring Event Logs
  •  .NET Security : Programming the Event Log Service (part 2) - Reading Event Logs, Writing Events
  •  .NET Security : Programming the Event Log Service (part 1) - Querying the Event Log System, Using Event Sources
  •  .NET Security : The Event Log Service Explained
  •  
    Top 10
    Review : Sigma 24mm f/1.4 DG HSM Art
    Review : Canon EF11-24mm f/4L USM
    Review : Creative Sound Blaster Roar 2
    Review : Philips Fidelio M2L
    Review : Alienware 17 - Dell's Alienware laptops
    Review Smartwatch : Wellograph
    Review : Xiaomi Redmi 2
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8