Want to highlight a helpful answer? Upvote!

Did someone help you, or did an answer or User Tip resolve your issue? Upvote by selecting the upvote arrow. Your feedback helps others! Learn more about when to upvote >

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

new malware disguised as flash installer

I'm a dummy....fell for the ruse, any ideas on how to get rid of this new malware? thanks

iMac, Mac OS X (10.6.8)

Posted on Sep 27, 2011 7:45 AM

Reply
128 replies

Sep 29, 2011 8:37 AM in response to andyBall_uk

Snow Leopard defines an expanded list of applications for which it "quarantines" downloaded files (marking that they've been downloaded from the Internet). So if you download a file via your Web browser (including Safari, Internet Explorer, Firefox, OmniWeb, Opera, Mozilla, Camino, and more) or an e-mail client (Mail, Entourage, or Thunderbird) or you receive a file via iChat, then it will be checked for malware when you open it.

Apparently, according to this, the original quarantining (xattr>com.apple.quarantine) works for downloads in Snow using browsers other than Safari.


But will files downloaded with browsers other than Safari be quarantined according to XProtect definitions, as well?

Sep 29, 2011 8:55 AM in response to cathy fasano

I've got the Install Manager folder. At first I was somewhat concerned about it but I figured that it probably was created when correctly updated my flash. The creation date and the modification date were identical and said that it was created around the time that I downloaded the update. There also was no source website for this folder.

Sep 29, 2011 9:11 AM in response to Ralph Deen

I think I may have fallen for the installer trick, maybe a few weeks ago. I have looked for all the files folks suggest finding in this thread, and have none. I also have downloaded the VirusBarrierX6 and am currently doing a full scan (so far nothing). Also, I've looked in Activity Monitor and not found any of the processes folks are complaining about.


That said, I'm quite worried about two things I've been seeing:

1. When I login, there is an extra quick blue flash on the screen. I should video it, but basically it looks like one quick flash. Happens at startup or login to any user account.

2. fake PC servers mounted in my network. Clicking them does nothing, yet they seem to be running from my machine. See attached image below.


Any thoughts? I'd like to make a quick clean break in any way possible, and am willing to go through any install recommendation or etc.


User uploaded file

Sep 29, 2011 10:16 AM in response to andyBall_uk

andyBall_uk wrote:


10.6 & later


http://support.apple.com/kb/HT3662

The quarantine system actually came to being in 10.5 and was enhanced for 10.6.


The XProtect system wasn't introduced until a security update to 10.6.7 in the MacDefender era. There was speculation at the time that it was a Lion feature that was rushed into use. The 10.6.8 update fixed some bugs in the update process.

Sep 29, 2011 10:20 AM in response to WZZZ

WZZZ wrote:


Apparently the original quarantining (xattr>com.apple.quarantine) works for downloads in Snow using browsers other than Safari.


But will files downloaded with browsers other than Safari be quarantined according to XProtect definitions, as well?

My understanding was that all quarantined files are supposed to be checked.


The colleague that I mentioned yesterday who purposely downloaded the Trojan used Safari and was not notified.

Sep 29, 2011 10:23 AM in response to mtuiuc

mtuiuc wrote:


I think I may have fallen for the installer trick, maybe a few weeks ago. I have looked for all the files folks suggest finding in this thread, and have none. I also have downloaded the VirusBarrierX6 and am currently doing a full scan (so far nothing). Also, I've looked in Activity Monitor and not found any of the processes folks are complaining abou

Then you did not install it.

That said, I'm quite worried about two things I've been seeing:

1. When I login, there is an extra quick blue flash on the screen. I should video it, but basically it looks like one quick flash. Happens at startup or login to any user account.

2. fake PC servers mounted in my network. Clicking them does nothing, yet they seem to be running from my machine. See attached image below.

None of the infected users have reported anything like this. Perhaps you should start a new thread.

Sep 29, 2011 10:27 AM in response to chrisfromhopewell

chrisfromhopewell wrote:


I tried going to this link (It is supposed to have the trojan on it, but I got this message when I went there.http://adobe

That means that the site is shut down, for some reason. It could be temporary, it could have been moved or they may have accomplished whatever they set out to do. Let's hope it was because the police came and confiscated their equipment when they were all arrested.

Sep 30, 2011 7:14 PM in response to Linc Davis

Linc,


Or anybody else with info...do we know the IP of where the Trojan phoned home to? Was it the same as the one that was serving up the installer?


The name "adobe software update" site has been removed from DNS so it no longer has an IP address. Using the old IP reveals that the server appears to have a bare apache server but nothing else. A port scan reveals the usual commonly open ports.


I'm just wondering if folks who don't know they are infected yet are still checking with the mother ship for updates, etc.?

new malware disguised as flash installer

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.