How to determine if you have been impacted by Flashback malware

Version 25
Last Modified: May 15, 2012 6:44 AM

Flashback is the latest attempt to infiltrate Macs as of April 7, 2012. 


Apple has posted a knowledgebase article about it.  Links below to the removal tools should only be applied after backing up.  Please read the entire article to determine

what is needed first before jumping into the fray.


For 10.7.3 users who do not have Java installed, Apple has now released a Flashback removal tool


For 10.6.8 users there is this patch.


For 10.5.8 Intel Users, May 14, 2012, Apple released this patch and removal tool.  From what is known PowerPC users are not affected, though Apple has yet to come out with a definitive statement.  Post to if you believe there should be a statement.


For 10.6.0 to 10.6.7, 10.7 to 10.7.2, 10.5.7 and earlier, disabling Java is probably the best action you can take to avoid being impacted.  Furthermore,

ignore any requests to update Adobe software from non-Adobe websites, or Java from non-Oracle or Sun websites, or Apple's Software Update.


If you appear to have been infected, and have a machine that supports 10.5.8 (Intel Macs older than August 28, 2009),  10.6.8 or 10.7.3 backup to a new place before installing any software, so you can see if you can apply the 10.5.8, 10.6.8, or 10.7.3 update if needed, and the patch it with Apple's patch to Java that corrects the hole in Java.  You may need to watch your financial data to ensure no one has hacked that or stolen your identity more carefully.   Several places on the net offer infection tests.  Some are more reliable than others, and I would ask in the forum to ensure you get the most reliable.


People with slow internet connections who need to update to the appropriate version of 10.5, 10.6 and 10.7, should take the appropriate link with them and copy the installer DMG file to a USB flash drive to be updated to the version able to be patched: 10.5.8 Combo10.6.8 Combo and 10.7.3 Combo.  If interested in updating to 10.7, read this tip.


Until all known varients of the malware have been diagnosed, you are probably better off with Sophos to ensure you catch all known variants.


Downloads Apple posted on April 12th at the same links Apple offered before now offer new capabilities. Only these now include a built-in removal tool of Flashback. 

If you have 10.5,8, 10.6.8 or 10.7.3, Apple's Java patch catches and stops most of these through the security updates in the links for each operating system, 10.5.8, 10.6.8 and 10.7.3


If after using these downloads, you still appear to have the Malware, be sure to post to the forum what you find, and someone will be able to help.