Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Has Apple posted security updates for OS 10.5.x in light of the Flashback (and similar) malware?

Greetings!

Does anyone know of planned patches for OS 10.5.x, Java, Safari, etc. in light of the Flashback Trojan (and other malware) appearance?

Rich

G5 Tower, MacBook Pro, Mac 8500C PPC Tower, Mac OS X (10.5.8), Also OS 9.1 and 8.1

Posted on May 3, 2012 2:35 PM

Reply
13 replies

May 3, 2012 3:02 PM in response to Richard Bonomo

Nope, & they're not likely to.


Disable Java in your Browser settings, not JavaScript.


http://support.apple.com/kb/HT5241?viewlocale=en_US

http://support.google.com/chrome/bin/answer.py?hl=en-GB&answer=142064

http://support.mozilla.org/en-US/kb/How%20to%20turn%20off%20Java%20applets


Flashback - Detect and remove the uprising Mac OS X Trojan...


http://www.mac-and-i.net/2012/04/flashback-detect-and-remove-uprising.html


In order to avoid detection, the installer will first look for the presence of some antivirus tools and other utilities that might be present on a power user's system, which according to F-Secure include the following:


/Library/Little Snitch

/Developer/Applications/Xcode.app/Contents/MacOS/Xcode

/Applications/VirusBarrier X6.app

/Applications/iAntiVirus/iAntiVirus.app

/Applications/avast!.app

/Applications/ClamXav.app

/Applications/HTTPScoop.app

/Applications/Packet Peeper.app


If these tools are found, then the malware deletes itself in an attempt to prevent detection by those who have the means and capability to do so. Many malware programs use this behavior, as was seen in others such as the Tsunami malware bot.


http://reviews.cnet.com/8301-13727_7-57410096-263/how-to-remove-the-flashback-ma lware-from-os-x/


http://x704.net/bbs/viewtopic.php?f=8&t=5844&p=70660#p70660


The most current flashback removal instructions are F-Secure's Trojan-Downloader:OSX/Flashback.K.


https://www.securelist.com/en/blog/208193454/Flashfake_Removal_Tool_and_online_c hecking_site


More bad news...


https://www.securelist.com/en/blog/208193467/SabPub_Mac_OS_X_Backdoor_Java_Explo its_Targeted_Attacks_and_Possible_APT_link

May 14, 2012 8:12 PM in response to Klaus1

Klaus1 wrote:


presumably because I cannot run a version of Flash Player that is vulnerable.

The Flash Player update is not related to Flashback, but you would be able to run versions of Flash Player prior to 10.1.102.64 if you wanted to.


BTW that "new" Flash Player came out in November 2010, so this is a really timely update they are giving out.

May 14, 2012 8:15 PM in response to John Galt

John Galt wrote:


Apple just released the following


Flashback Removal Security Update

Except that the OP was looking for a Java update which isn't part of this. So what happens if you come up clean and the next site you visit with Java left turned on is the Flashback site...you are infected. Kind of a half hearted update if you ask me. Let's hope there is more to come.

May 15, 2012 3:45 AM in response to MadMacs0

MadMacs0 wrote:


John Galt wrote:


Apple just released the following


Flashback Removal Security Update

Except that the OP was looking for a Java update which isn't part of this. So what happens if you come up clean and the next site you visit with Java left turned on is the Flashback site...you are infected. Kind of a half hearted update if you ask me. Let's hope there is more to come.

Agree, sounds quite lame, especially since it may give those who run the update and don't understand what it does and doesn't do a false sense of security.

May 15, 2012 7:18 PM in response to GW Schreyer

a brody is right, PPC Macs have not been infected due to the trojan being Intel code only, but many ways to protect yourself on PPC Macs...


Disable Java in your Browser settings, not JavaScript.


http://support.apple.com/kb/HT5241?viewlocale=en_US

http://support.google.com/chrome/bin/answer.py?hl=en-GB&answer=142064

http://support.mozilla.org/en-US/kb/How%20to%20turn%20off%20Java%20applets


Little Snitch, stops/alerts outgoing stuff...

http://www.obdev.at/products/littlesnitch/index.html


Flashback - Detect and remove the uprising Mac OS X Trojan...


http://www.mac-and-i.net/2012/04/flashback-detect-and-remove-uprising.html


In order to avoid detection, the installer will first look for the presence of some antivirus tools and other utilities that might be present on a power user's system, which according to F-Secure include the following:


/Library/Little Snitch

/Developer/Applications/Xcode.app/Contents/MacOS/Xcode

/Applications/VirusBarrier X6.app

/Applications/iAntiVirus/iAntiVirus.app

/Applications/avast!.app

/Applications/ClamXav.app

/Applications/HTTPScoop.app

/Applications/Packet Peeper.app


If these tools are found, then the malware deletes itself in an attempt to prevent detection by those who have the means and capability to do so. Many malware programs use this behavior, as was seen in others such as the Tsunami malware bot.


MadMacs0 says...


This script from F-Secure is the only one I'm currently recommending http://www.f-secure.com/weblog/archives/00002346.html


http://reviews.cnet.com/8301-13727_7-57410096-263/how-to-remove-the-flashback-ma lware-from-os-x/


http://x704.net/bbs/viewtopic.php?f=8&t=5844&p=70660#p70660


Open DNS also blocks the FlashBack thing...


http://blog.opendns.com/2012/04/09/worried-about-mac-malware-just-set-up-opendns /

Has Apple posted security updates for OS 10.5.x in light of the Flashback (and similar) malware?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.