The Trojan horse targets a vulnerability in Java on Mac OS X system by tricking persons into visiting a compromised or malicious website with a carefully crafted Java Applet, which is used to download and execute malicious code from a remote location on the internet.
According to Intego, once a computer is infected with this Trojan horse, it will create a backdoor, which will allow hackers to access the infected computer remotely from anywhere in the world. With this access to the infected machine, hackers will be able to spy on the victim’s computer activities, steal his/her user names or passwords, use the same computer to commit other cybercrimes, or just do about anything that they want to.
Back in 2012, Apple Security team released a security update and a Flashback Trojan Removal tool to help protect uninfected computers from getting infected and to remove the threat from infected computers.
In early 2013, a few of Apple employees’ computers got infected with the same Trojan horse that took advanatage of the Java Security Bypass Zero-Day exploit, when someone at Apple visited a compromised website.
Now, almost two years after this threat was discovered, Intego has reported that at least twenty two thousand (22,000) Mac computers are infected with this dangerous Trojan horse.
How to protect yourself against the Flashback Trojan horse
To prevent your computer from getting infected or to remove this threat from computer, please download Apple’s latest software updates and the following Flashback Trojan removal tool:
Click here to download the Apple’s Flashback Trojan removal tool
Even if you think that your computer is not infected with this malware, please download and run the removal tool as a precautionary measure.
For more information about this threat, please click here.
Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews. NB: We will use your IP address to display your approximate location to other users. That location is not enough to find you.
Your comment, answer, or review will be set as anonymous because you are not signed in. An anonymous comment, answer, or review cannot be edited or deleted, therefore, review it carefully before posting. Sign-in.
Write Your Comment, Question, Answer, or Review
Recommendation / Advertisement