Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

I updated Java, but I do I know that I'm flashback free?

How do you detect the presence of FLASHBACK on your machine?

MacBook Pro (15-inch Late 2011), Mac OS X (10.6.8)

Posted on Apr 11, 2012 7:47 PM

Reply
21 replies

Apr 11, 2012 7:48 PM in response to Nanonaut

Helpful Links Regarding Flashback Trojan


A link to a great User Tip about the trojan: Flashback Trojan User Tip

A related link in the tip to a checker: Malware Checker Dowload Link


A Google search can reveal a variety of alternatives on how the remove the trojan should your computer get infected. This can get you started.


For now I recommend the User Tip from etressoft to detect and remove:


Checking for and removing the "Flashback" trojan

Kaspersky Flashback Trojan Site:Flashback Trojan Detection and Removal


Also see Apple's article About Flashback malware.

Apr 12, 2012 3:50 PM in response to jsd2

And the new update is marked ... recommended for all mac users with Java INSTALLED. Does that mean that if Java has been disabled (which is what most people seem to have done) the update can be Ignored.


Indeed, if Java has been disabled I assume the update will not be effective anyway.


So, do we enable Java in our browsers, download the update then disable Java ... so we can be prepared, if at some future date for some particular reason we need to have Java enabled.


It's getting more complex by the hour.

Apr 12, 2012 5:08 PM in response to jsd2

This Java security update removes the most common variants of the Flashback malware.

What about the not so common and newly emerging ones, he asks himself. I'll answer myself. I suppose Apple is doing a nice CYA by saying "if you don't use Java, disable it in your web browser."

Apr 13, 2012 9:36 AM in response to WZZZ

WZZZ wrote:

What about the not so common and newly emerging ones, he asks himself. I'll answer myself. I suppose Apple is doing a nice CYA by saying "if you don't use Java, disable it in your web browser."

The older variants of FlashBack didn't rely on any Java vulnerability to begin with -- they were simple Trojans that had to trick users into clicking on something to be installed, similar to the earlier Mac Defender trojans. These older variants were rarely encountered "in the wild" & apparently the C&C servers they contacted never actually went fully "live." Basically, they weren't ever common or much of a threat.


The latest, most common variants of FlashBack are examples of "drive by" malware -- users don't have to do anything besides visit a maliciously crafted web page for the first part of the malware to run on their Macs. That part exploits the now patched Java vulnerabilities to install or modify files that in turn attempt to contact a new set of C&C servers to download the payload that does the actual infection, get further instructions, or send compromised data back to these servers.


Unless & until the attackers can find a different, still unpatched Java vulnerability to exploit, Apple's updates have shut the door on any Flashback variant that relies on Java. Of course, this is possible, but it is also possible attackers will find some completely different method of attack.

I updated Java, but I do I know that I'm flashback free?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.