Ralph Deen

Q: new malware disguised as flash installer

I'm a dummy....fell for the ruse, any ideas on how to get rid of this new malware?  thanks

iMac, Mac OS X (10.6.8)

Posted on Sep 27, 2011 7:45 AM

Close

Q: new malware disguised as flash installer

  • All replies
  • Helpful answers

first Previous Page 3 of 9 last Next
  • by MadMacs0,

    MadMacs0 MadMacs0 Sep 27, 2011 2:17 PM in response to Sam Beaver
    Level 5 (4,801 points)
    Sep 27, 2011 2:17 PM in response to Sam Beaver

    Sam Beaver wrote:

     

    thanks for the heads up. this install flash thing had popped open earlier today, but never got around to installing it.

    Any luck on a URL for this thing?  We really need to get this thing to the right folks.  It should still be in your browser history.  Send the URL in a message to <makeupanyname>@mailinator.com and let us know what "makeupanyname" is.

  • by Linc Davis,

    Linc Davis Linc Davis Sep 27, 2011 2:36 PM in response to SteveKir
    Level 10 (208,037 points)
    Applications
    Sep 27, 2011 2:36 PM in response to SteveKir

    If you installed a trojan, as you say you did, and you haven't removed it, then no, you're not safe. I don't know what you installed, nor do I know whether the information being promulgated about one particular trojan (not necessarily the same one) is accurate.

     

    What I would do in your place is to back up my data, erase the startup volume, reinstall the OS, run Software Update, then carefully restore my user files, including only what I recognized as legitimate. I'd also reinstall all my third-party software from fresh downloads or original media.

  • by andyBall_uk,

    andyBall_uk andyBall_uk Sep 27, 2011 2:43 PM in response to Linc Davis
    Level 7 (20,495 points)
    Sep 27, 2011 2:43 PM in response to Linc Davis

    >>If you installed a trojan, as you say you did...

     

    Steve didn't say that - just that he had what may be the dmg of a genuine beta of Flash. If finder doesn't say where its from, or it's not from adobe/macromedia - then Steve should worry.

  • by SteveKir,

    SteveKir SteveKir Sep 27, 2011 2:44 PM in response to Linc Davis
    Level 3 (546 points)
    Sep 27, 2011 2:44 PM in response to Linc Davis

    Thanks. Will do.

     

    Final question: Do youknow what the risks are? Eg., keyboard logging (which must be the most dangerous), corrupting system files, email or internet snooping, etc. etc.

  • by WZZZ,

    WZZZ WZZZ Sep 27, 2011 2:56 PM in response to SteveKir
    Level 6 (13,112 points)
    Mac OS X
    Sep 27, 2011 2:56 PM in response to SteveKir

    SteveKir wrote:

     

    Thanks. Will do.

     

    Final question: Do youknow what the risks are? Eg., keyboard logging (which must be the most dangerous), corrupting system files, email or internet snooping, etc. etc.

    I don't think anyone knows just yet. It's only just now being analyzed. Intego seems to be one of the first to the game. Maybe Intego will give an update.

     

    There hasn't been an XProtect update since the 24th, which was for the OSX Revir.A Trojan. So I don't think Apple has included this yet.

  • by SteveKir,

    SteveKir SteveKir Sep 27, 2011 2:52 PM in response to andyBall_uk
    Level 3 (546 points)
    Sep 27, 2011 2:52 PM in response to andyBall_uk

    andyBall_uk wrote:

     

    If finder doesn't say where its from..

     

    So how can I use Finder to discover where it is from? GetInfo does not show that. It often includes a copyright reference, although a producer of malware could do that.

  • by Király,

    Király Király Sep 27, 2011 2:56 PM in response to Ralph Deen
    Level 6 (9,855 points)
    Mac OS X
    Sep 27, 2011 2:56 PM in response to Ralph Deen

    Hi Ralph,

     

    The easiest way to get rid of it is to restore the last full system backup that was made before the "oops" moment.  Had you been using Time Machine?  If not, what other recent backups do you have? 

  • by MaryThomas,

    MaryThomas MaryThomas Sep 27, 2011 2:57 PM in response to Linc Davis
    Level 1 (30 points)
    Sep 27, 2011 2:57 PM in response to Linc Davis

    > What I would do in your place is to

    > back up my data,

    > erase the startup volume,

     

    In Disk Utility? Erase the drive ABOVE where it says Macintosh HD?

     

    > reinstall the OS,

     

    How does one do that with a 2011 MacBook Air? Information I found about Lion Recovery

    http://support.apple.com/kb/HT4718

    requires a wifi connection as does loading it remotely from a DVD in my mac mini. Doesn't the trojan require wifi to access an infected computer? (I don't have a DVD or thumb drive with Lion on it since I bought it from the Mac App Store.)

     

    > run Software Update, then carefully restore my user files, including only what I recognized as legitimate. I'd also > reinstall all my third-party software from fresh downloads or original media.

     

    This is the easy part...

     

    Thanks for any help anyone can provide.

  • by WZZZ,

    WZZZ WZZZ Sep 27, 2011 2:57 PM in response to SteveKir
    Level 6 (13,112 points)
    Mac OS X
    Sep 27, 2011 2:57 PM in response to SteveKir

    SteveKir wrote:

     

    andyBall_uk wrote:

     

    If finder doesn't say where its from..

     

    So how can I use Finder to discover where it is from? GetInfo does not show that. It often includes a copyright reference, although a producer of malware could do that.

    Get EasyFind.

     

    http://www.devon-technologies.com/download/index.html

  • by andyBall_uk,

    andyBall_uk andyBall_uk Sep 27, 2011 2:58 PM in response to SteveKir
    Level 7 (20,495 points)
    Sep 27, 2011 2:58 PM in response to SteveKir

    the OS should record 'where from' & display it in get-info.

    If you can't verify it by checking your browser history - then without checking the dmg, you might have a problem.

  • by jsd2,

    jsd2 jsd2 Sep 27, 2011 3:12 PM in response to WZZZ
    Level 5 (6,215 points)
    Sep 27, 2011 3:12 PM in response to WZZZ

    It looks as if Apple just added this trojan to its malware-detection quarantine feature, which should help protect against future infection.

    I just looked at

     

    /System/Library/CoreServices/CoreTypes.bundle/Contents/Resources/XProtect.plist

     

    with a property list editor, and found

    Screen Shot 2011-09-27 at 5.59.02 PM.png

    The file was last modified today.

  • by WZZZ,

    WZZZ WZZZ Sep 27, 2011 3:23 PM in response to jsd2
    Level 6 (13,112 points)
    Mac OS X
    Sep 27, 2011 3:23 PM in response to jsd2

    Thanks. I booted up early this morning and it hadn't yet been distributed. That's good to know that Apple appears to be staying on top of all the latest emerging malware. I was kind of skeptical at first, thinking it was mainly a PR response to the MacDefender episode.

     

    (Off topic, but I replied to you here about preventing Flash Cookies.)

  • by MadMacs0,

    MadMacs0 MadMacs0 Sep 27, 2011 3:22 PM in response to SteveKir
    Level 5 (4,801 points)
    Sep 27, 2011 3:22 PM in response to SteveKir

    SteveKir wrote:

     

    Do youknow what the risks are? Eg., keyboard logging (which must be the most dangerous), corrupting system files, email or internet snooping, etc. etc.

    All we think we know is in the Intego announcement Mac Flashback Trojan Horse Masquerades as Flash Player Installer Package where they say "Intego’s security researchers are analyzing the injected code and we will issue more information as soon as possible."

  • by WZZZ,

    WZZZ WZZZ Sep 27, 2011 3:27 PM in response to SteveKir
    Level 6 (13,112 points)
    Mac OS X
    Sep 27, 2011 3:27 PM in response to SteveKir

    Steve, I wouldn't be in a mad rush to erase and reinstall. Wait until there's a full analysis and then run one of the AVs. Maybe MadMacs0 will let us know as soon as ClamX has cataloged it.

  • by MadMacs0,

    MadMacs0 MadMacs0 Sep 27, 2011 4:01 PM in response to MadMacs0
    Level 5 (4,801 points)
    Sep 27, 2011 4:01 PM in response to MadMacs0

    Actually, Intego just posted an update More About the Flashback Trojan Horse in which they reveal how sophisticated the code is, but nothing more about what it installs where nor how to remove it.  Currently it appears that all it does is upload information about your hardware ID, whether intel or PPC and what version of Mac OS X you are running.  It is capable of updating itself and download additional software, but is currently not doing this.

first Previous Page 3 of 9 last Next