Apple Hack Caused by Java Security Bypass Zero-Day Exploit

Apple Hack Caused by Java Security Bypass Zero-Day Exploit

Would you share this Article with others?  +

Apple employee computers got infected with malwares after they visited a malicious website. This infection was caused by an exploit in Oracle Java web browser plug-in that was discovered a few weeks ago. The exploit is called Java Security Bypass Zero-Day.

Apple released the following statement about the attack:

"Apple has identified malware which infected a limited number of Mac systems through a vulnerability in the Java plug-in for browsers. The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers. We identified a small number of systems within Apple that were infected and isolated them from our network. There is no evidence that any data left Apple. We are working closely with law enforcement to find the source of the malware.

Since OS X Lion, Macs have shipped without Java installed and as a added security measure OS X automatically disables Java if it has been unused for 35 protect Mac users that have installed Java, today we are releasing an updated Java malware removal tool that will check Mac systems and remove this malware if found."

Facebook suffered the same malware attack last week but claimed that user-data was not compromised.

Twitter said they were also attacked and is still investigating to determine if user-data was compromised. It is alleged that these attacks were carried out by a small division of the Chinese army.

Please ensure that you have the recommended version of Java running on your computer by clicking here.

For information about the "Java Security Bypass Zero-day" exploit, click here.

Read more about this story by clicking here.

Note: Some of the names, addresses, email addresses, telephone numbers or other information in samples on this website may have been impersonated or spoofed.

Check the comment section below for additional information and share what you know or ask a question about this article by leaving a comment below.

Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: And, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent. Also, to quickly find answers to your questions, use our search engine.

You can help maintain Online Threat Alerts (OTA) by paying a service fee. Click here to make payment.

Comments, Questions, Answers, or Reviews

There are no comments as yet, please leave one below or revisit.

To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews. Also, remember to keep comments, reviews, answers respectful.

Write Your Comment, Question, Answer, or Review

Write your comment, question, answer, or review in the box below to share what you know or to get answers. NB: We will use your IP address to display your approximate location to other users.

Your comment, question, answer, or review will be posted as an anonymous user because you are not signed in. Anonymous posts cannot be edited or deleted. Sign-in.

Keep your comment respectful or it will not be posted.

Apple Hack Caused by Java Security Bypass Zero-Day Exploit