Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • Networking
    • PC Hardware

    Flashback

    By
    Jeff Burt
    -
    April 19, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Flashback

      1

      First detected in 2011 as a classic Trojan horse, masquerading as an update to Adobe Flash, the malware evolved into a drive-by exploit that infected the systems of Mac users who visited compromised or malicious sites. The malware infections have dropped over the past couple of weeks, from more than 600,000 to about 140,000, according to Symantec, but the damage has been done to Apple’s security reputation.

      2Sabpab

      2

      Also known as SabPub, the Trojan exploited the same Java vulnerability as Flashback to get into Macs and steal information. It started appearing just as the Flashback malware was getting under control. It appears to be aimed primarily at Tibetan sympathizers, so the threat of widespread infection is not nearly as great at Flashback.

      3Tsunami Trojan

      3

      Originally written for Linux systems, malware authors apparently ported the Trojan in hopes of hijacking Mac OS X systems, which once compromised, could be used to launch denial-of-service attacks. Detected in October 2011, the Tsunami Trojan apparently was derived from Kaiten, a backdoor Trojan dating back to at least 2002 and aimed at Linux systems.

      4OSX/Imuler-B

      4

      This Trojan horse reportedly used images of a supermodel, Irina Shayk, who was the cover girl on the March 2012 issue of FHM magazine. The malware authors hoped to lure Mac users into clicking on an image of the scantily clad model, and while the photo appeared on the screen, the malware had opened a backdoor to the Mac and uploaded private data to a remote Web server.

      5Trojan-Dropper:OSX.Revir.A

      5

      Security software vendor F-Secure said in September 2011 that this Trojan disguised itself as a PDF file as a way of tricking Mac users into clicking on it. Once opened, the malware tried to install the OSX/Imuler.A backdoor in the background while the user reads the PDF file.

      6MacDefender Fake AV

      6

      MacDefender, detected in May 2011, was a fake antivirus program that downloaded itself onto a computer. The rogue software used the name of the legitimate MacDefender program in hopes of tricking users into thinking it was the real security software. Once a user clicked on the rogue link, they were directed to a Website containing malicious JavaScript code that displayed a fake scan. Other variants of the fake AV malware also were circulating with names like MacProtector, MacSecurity and Apple Security Center.

      7PDF Bug in Safari

      7

      In July 2011, a flaw in the Safari Web browser was discovered that, if exploited, could potentially have allowed attackers to remotely take over iPhones, iPads and iPod Touch devices. According to a warning from the German Federal Office for Information Security, the security flaw in Safari could enable attackers to infect users’ iOS devices with malicious software that would give them administrator privileges just by displaying infected PDF files.

      8Weyland-Yutani Bot Kit

      8

      Danish security researchers in May 2011 discovered a crimeware kit that was for sale for $1,000 that purported to enable attackers to create malware for the Mac OS X platform. The researchers said it represented the first-ever kit for Mac malware that also could steal data entered into a Firefox browser. They said they expected versions for Chrome and Safari to follow, along with others aimed at Apple’s iPad and Linux systems.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×